Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.ps1

Overview

General Information

Sample name:1.ps1
Analysis ID:1636808
MD5:924dbcbb0eda55d7f6f0978bb22dbdda
SHA1:42e8afbdf57113d79a878ec70f70dfca486e7afb
SHA256:57b2cb1adb81aaab06200bd39717974236016959792ff7cc8d1f4536efa69b9d
Infos:

Detection

RHADAMANTHYS
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Early bird code injection technique detected
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected RHADAMANTHYS Stealer
.NET source code contains potential unpacker
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected MSILLoadEncryptedAssembly
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dllhost Internet Connection
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • powershell.exe (PID: 7800 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7436 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • svchost.exe (PID: 2132 cmdline: "C:\Windows\System32\svchost.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • svchost.exe (PID: 5148 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • chrome.exe (PID: 612 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" MD5: E81F54E6C1129887AEA47E7D092680BF)
          • chrome.exe (PID: 2084 cmdline: --user-data-dir="C:\Users\user\AppData\Local\Temp\chr2E95.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/d4a75c5f/4a1b3c1a" MD5: E81F54E6C1129887AEA47E7D092680BF)
            • chrome.exe (PID: 7088 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2188,i,10742310718371479009,15157293769129927295,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
          • wmpshare.exe (PID: 4348 cmdline: "C:\Program Files\Windows Media Player\wmpshare.exe" MD5: A89F75B51EAADA8C97F8D674B3EDB2F2)
            • dllhost.exe (PID: 1596 cmdline: "C:\Windows\system32\dllhost.exe" MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • WerFault.exe (PID: 5324 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 496 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • notepad.exe (PID: 7952 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\1.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • svchost.exe (PID: 8088 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • elevation_service.exe (PID: 3692 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: BF076931DBBF2CA64F5835A94A11DD46)
  • AvastBrowserUpdate.exe (PID: 3484 cmdline: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe MD5: BAD9E53D3D2FCC281D2123F729E278BF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.
  • Sandworm
https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000B.00000003.1784088434.0000000003840000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
    0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        0000000A.00000002.1793738107.00000000041E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
          00000000.00000002.1771943733.0000000005A09000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.powershell.exe.61ab0d0.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.powershell.exe.616b8e4.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.powershell.exe.6118a90.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.powershell.exe.61ab0d0.0.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    11.3.svchost.exe.57f0000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 4 entries
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3556, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1", ProcessId: 7800, ProcessName: powershell.exe
                      Source: Network ConnectionAuthor: bartblaze: Data: DestinationIp: 91.240.118.2, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\dllhost.exe, Initiated: true, ProcessId: 1596, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49738
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7436, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 2132, ProcessName: svchost.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3556, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1", ProcessId: 7800, ProcessName: powershell.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 8088, ProcessName: svchost.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-13T06:25:12.966490+010028548242Potentially Bad Traffic185.147.124.25353192.168.2.449736TCP
                      2025-03-13T06:25:25.123075+010028548242Potentially Bad Traffic185.147.124.25353192.168.2.449737TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-13T06:24:39.103149+010028330221A Network Trojan was detected172.67.166.76443192.168.2.449727TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-13T06:24:44.523585+010028548021Domain Observed Used for C2 Detected185.147.124.25353192.168.2.449728TCP
                      2025-03-13T06:25:12.966490+010028548021Domain Observed Used for C2 Detected185.147.124.25353192.168.2.449736TCP
                      2025-03-13T06:25:25.123075+010028548021Domain Observed Used for C2 Detected185.147.124.25353192.168.2.449737TCP
                      2025-03-13T06:25:41.445360+010028548021Domain Observed Used for C2 Detected91.240.118.2443192.168.2.449738TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: https://usa.trendys.cloud/code.binAvira URL Cloud: Label: malware
                      Source: 1.ps1ReversingLabs: Detection: 29%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E96B88 CryptUnprotectData,15_2_00007DF4E0E96B88
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F23838 calloc,CryptProtectData,LocalFree,CreateFileW,WriteFile,CloseHandle,22_3_00007DF480F23838
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D478EEC zip_fopen_index,zip_fopen_index_encrypted,24_2_6D478EEC
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D416960 CryptHashCertificate,24_2_6D416960
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D416B60 CryptQueryObject,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertCloseStore,24_2_6D416B60
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3AA591 CryptReleaseContext,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,24_2_6D3AA591
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3A47F8 CryptProtectData,LocalFree,24_2_6D3A47F8
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D474312 CryptAcquireContextW,GetLastError,CryptReleaseContext,24_2_6D474312
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D41592F CryptVerifySignatureW,CryptDestroyHash,CryptDestroyKey,24_2_6D41592F
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4158C9 CryptHashData,24_2_6D4158C9
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3F5554 CryptUnprotectData,GetLastError,LocalFree,24_2_6D3F5554
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D47D76E zip_fopen_index_encrypted,zip_source_open,zip_source_free,24_2_6D47D76E
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D41570A CryptDecodeObjectEx,CryptImportPublicKeyInfo,CryptCreateHash,24_2_6D41570A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FAEE67C CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,24_2_7FAEE67C
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FAE4FA6 memset,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,24_2_7FAE4FA6
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_773970b1-9
                      Source: unknownHTTPS traffic detected: 172.67.166.76:443 -> 192.168.2.4:49727 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.4:49738 version: TLS 1.2
                      Source: Binary string: wkernel32.pdb source: svchost.exe, 0000000B.00000003.1789625687.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789690528.0000000005910000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: svchost.exe, 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: powershell.exe, 00000000.00000002.1786845908.00000000069E0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: svchost.exe, 0000000B.00000003.1787834240.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1788496088.00000000059E0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973260532.00000267327B0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973101219.00000267325C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: svchost.exe, 0000000B.00000003.1789056248.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789443974.0000000005990000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: svchost.exe, 0000000B.00000003.1787834240.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1788496088.00000000059E0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973260532.00000267327B0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973101219.00000267325C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: powershell.exe, 00000000.00000002.1786845908.00000000069E0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: svchost.exe, 0000000B.00000003.1789056248.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789443974.0000000005990000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: chrome_elf.dll.pdb source: chrome.exe, 00000012.00000002.2074551064.00007FFCA130F000.00000002.00000001.01000000.0000000E.sdmp
                      Source: Binary string: AvastBrowserUpdate_unsigned.pdb source: AvastBrowserUpdate.exe
                      Source: Binary string: wkernelbase.pdbUGP source: svchost.exe, 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernel32.pdbUGP source: svchost.exe, 0000000B.00000003.1789625687.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789690528.0000000005910000.00000004.00000001.00020000.00000000.sdmp
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E91618 FindFirstFileW,DeleteFileW,FindNextFileW,RemoveDirectoryW,15_2_00007DF4E0E91618
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5C126 FindFirstFileExW,24_2_00C5C126
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D396118 FindFirstFileW,FindClose,FindNextFileW,24_2_6D396118
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3678C0 FindFirstFileW,GetLastError,_wcslen,DeleteFileW,FindNextFileW,GetLastError,FindClose,24_2_6D3678C0
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D367A07 GetFileAttributesW,GetLastError,_wcslen,FindFirstFileW,GetLastError,_wcslen,_wcslen,FindNextFileW,FindClose,RemoveDirectoryW,24_2_6D367A07
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D369507 FindFirstFileW,FindNextFileW,FindClose,24_2_6D369507
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D38944D FindFirstFileW,FindNextFileW,FindClose,24_2_6D38944D
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D367789 FindFirstFileW,FindNextFileW,GetLastError,FindClose,24_2_6D367789
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D36D6DE FindFirstFileW,FindNextFileW,FindClose,24_2_6D36D6DE
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3A92EE FindFirstFileW,GetLastError,PathStripPathW,PathStripPathW,PathStripPathW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,FindNextFileW,GetLastError,FindClose,24_2_6D3A92EE
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D371FC7 GetLogicalDriveStringsW,QueryDosDeviceW,_wcslen,_wcslen,24_2_6D371FC7
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\AdobeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcrobatJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DCJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIAJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: C:\Windows\System32\svchost.exeCode function: 4x nop then dec esp15_2_00000218A63D0511
                      Source: C:\Windows\System32\svchost.exeCode function: 4x nop then dec esp15_2_00007DF4E0EA25B1
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 4x nop then dec esp18_2_00000267309B25B1
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 4x nop then dec esp22_2_0000022ED1F45681
                      Source: chrome.exeMemory has grown: Private usage: 3MB later: 26MB

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 185.147.124.2:5353 -> 192.168.2.4:49728
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 185.147.124.2:5353 -> 192.168.2.4:49736
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 185.147.124.2:5353 -> 192.168.2.4:49737
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 91.240.118.2:443 -> 192.168.2.4:49738
                      Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 185.147.124.2 5353Jump to behavior
                      Source: global trafficHTTP traffic detected: GET /code.bin HTTP/1.1Host: usa.trendys.cloudConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 194.58.203.20 194.58.203.20
                      Source: Joe Sandbox ViewIP Address: 213.239.239.164 213.239.239.164
                      Source: Joe Sandbox ViewIP Address: 94.198.159.14 94.198.159.14
                      Source: Joe Sandbox ViewIP Address: 169.229.128.134 169.229.128.134
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Joe Sandbox ViewJA3 fingerprint: caec7ddf6889590d999d7ca1b76373b6
                      Source: Network trafficSuricata IDS: 2854824 - Severity 2 - ETPRO JA3 HASH Suspected Malware Related Response : 185.147.124.2:5353 -> 192.168.2.4:49736
                      Source: Network trafficSuricata IDS: 2854824 - Severity 2 - ETPRO JA3 HASH Suspected Malware Related Response : 185.147.124.2:5353 -> 192.168.2.4:49737
                      Source: Network trafficSuricata IDS: 2833022 - Severity 1 - ETPRO MALWARE Possible Malicious Second Stage Download with Terse Headers : 172.67.166.76:443 -> 192.168.2.4:49727
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.147.124.2
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3F63A9 HttpQueryInfoW,InternetReadFile,InternetQueryDataAvailable,24_2_6D3F63A9
                      Source: global trafficHTTP traffic detected: GET /code.bin HTTP/1.1Host: usa.trendys.cloudConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: usa.trendys.cloud
                      Source: global trafficDNS traffic detected: DNS query: ntp1.net.berkeley.edu
                      Source: global trafficDNS traffic detected: DNS query: ntp.nict.jp
                      Source: global trafficDNS traffic detected: DNS query: x.ns.gin.ntt.net
                      Source: global trafficDNS traffic detected: DNS query: ntp.time.nl
                      Source: global trafficDNS traffic detected: DNS query: ntp1.hetzner.de
                      Source: global trafficDNS traffic detected: DNS query: gbg1.ntp.se
                      Source: global trafficDNS traffic detected: DNS query: i.imgur.com
                      Source: svchost.exe, 0000000F.00000003.2112575910.00000218A6E12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:8000/d4a75c5f/4a1b3c1a
                      Source: svchost.exe, 00000003.00000002.2414013496.00000181D0800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0B07000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                      Source: powershell.exe, 00000000.00000002.1771943733.00000000048C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: svchost.exe, 0000000F.00000003.2092507403.00000218A6CF0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2092585618.00000218A6CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.147.124.2:5353/78fc5131525a9e8d335b1/dpa3122v.camha
                      Source: svchost.exe, 0000000B.00000002.1854363388.000000000370C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2408764622.00000218A63D0000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://185.147.124.2:5353/78fc5131525a9e8d335b1/dpa3122v.camhakernelbasentdllkernel32GetProcessMiti
                      Source: svchost.exe, 0000000B.00000002.1847779211.000000000327C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://185.147.124.2:5353/78fc5131525a9e8d335b1/dpa3122v.camhax
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                      Source: powershell.exe, 00000000.00000002.1771943733.00000000048C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: chrome.exe, 00000012.00000002.2074551064.00007FFCA130F000.00000002.00000001.01000000.0000000E.sdmp, AvastBrowserUpdate.exeString found in binary or memory: https://clients2.google.com/cr/report
                      Source: AvastBrowserUpdate.exeString found in binary or memory: https://clients2.google.com/service/check2?crx3=true
                      Source: AvastBrowserUpdate.exeString found in binary or memory: https://clients5.google.com/tbproxy/usagestats
                      Source: svchost.exe, 0000000B.00000003.1807400387.000000000379F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudflare-dns.com/dns-query
                      Source: svchost.exe, 0000000B.00000003.1807400387.000000000379F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
                      Source: svchost.exe, 0000000F.00000003.2092079890.00000218A6C12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2092004550.00000218A6C12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                      Source: svchost.exe, 0000000F.00000003.2092079890.00000218A6C12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2092004550.00000218A6C12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0AC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0AFF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1207801464.00000181D0A0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0AC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0AA3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1207801464.00000181D0B07000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1207801464.00000181D0AC2000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1207801464.00000181D0AF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0AC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                      Source: AvastBrowserUpdate.exeString found in binary or memory: https://m.google.com/devicemanagement/data/api
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0AC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
                      Source: svchost.exe, 00000003.00000003.1207801464.00000181D0A56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
                      Source: AvastBrowserUpdate.exeString found in binary or memory: https://update.googleapis.com/service/update2
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                      Source: svchost.exe, 0000000F.00000003.2088834816.00000218A6F5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                      Source: AvastBrowserUpdate.exeString found in binary or memory: https://www.google.com/support/installer/?
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: unknownHTTPS traffic detected: 172.67.166.76:443 -> 192.168.2.4:49727 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.240.118.2:443 -> 192.168.2.4:49738 version: TLS 1.2
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3714B6 lstrlenW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,24_2_6D3714B6
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3714B6 lstrlenW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,24_2_6D3714B6
                      Source: svchost.exe, 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_95770736-8
                      Source: svchost.exe, 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_d7d691db-9
                      Source: Yara matchFile source: 11.3.svchost.exe.57f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.3.svchost.exe.57f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.3.svchost.exe.57f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.3.svchost.exe.5a10000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.3.svchost.exe.5a10000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2132, type: MEMORYSTR
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E91364 CreateDesktopW,CreateProcessW,GetExitCodeProcess,TerminateProcess,15_2_00007DF4E0E91364
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B8F910 NtResumeThread,0_2_06B8F910
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B8F908 NtResumeThread,0_2_06B8F908
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00000218A63D15C0 NtAcceptConnectPort,15_2_00000218A63D15C0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00000218A63D1CF4 NtAcceptConnectPort,CloseHandle,15_2_00000218A63D1CF4
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9F050 NtAcceptConnectPort,15_2_00007DF4E0E9F050
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9FFDC malloc,RtlDosPathNameToNtPathName_U,NtAcceptConnectPort,NtAcceptConnectPort,free,15_2_00007DF4E0E9FFDC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9EFCC NtAcceptConnectPort,15_2_00007DF4E0E9EFCC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9EFAC NtAcceptConnectPort,15_2_00007DF4E0E9EFAC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9F0B8 NtAcceptConnectPort,15_2_00007DF4E0E9F0B8
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9F244 NtAcceptConnectPort,15_2_00007DF4E0E9F244
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9F224 NtAcceptConnectPort,15_2_00007DF4E0E9F224
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EA0188 calloc,NtAcceptConnectPort,free,15_2_00007DF4E0EA0188
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9F3FC CreateFileMappingW,MapViewOfFile,DuplicateHandle,NtAcceptConnectPort,15_2_00007DF4E0E9F3FC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9F76C calloc,DuplicateHandle,NtAcceptConnectPort,free,NtAcceptConnectPort,NtAcceptConnectPort,15_2_00007DF4E0E9F76C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9EEF0 NtAcceptConnectPort,15_2_00007DF4E0E9EEF0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309AEF64 NtAcceptConnectPort,18_2_00000267309AEF64
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309AF19C NtAcceptConnectPort,18_2_00000267309AF19C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,22_3_00007DF480F31958
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,22_3_00007DF480F31958
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,22_3_00007DF480F31CE8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,22_3_00007DF480F31CE8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,22_3_00007DF480F31CE8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31CE8 calloc,CreateProcessW,NtResumeThread,CloseHandle,free,22_3_00007DF480F31CE8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,22_3_00007DF480F31958
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F31958 calloc,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,22_3_00007DF480F31958
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F52FD0 NtAcceptConnectPort,22_2_0000022ED1F52FD0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F52FA0 NtAcceptConnectPort,22_2_0000022ED1F52FA0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F52F74 NtAcceptConnectPort,22_2_0000022ED1F52F74
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F52EA0 NtAcceptConnectPort,22_2_0000022ED1F52EA0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F530BC NtAcceptConnectPort,22_2_0000022ED1F530BC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F53078 NtAcceptConnectPort,22_2_0000022ED1F53078
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F52C14 NtAcceptConnectPort,22_2_0000022ED1F52C14
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5334C NtAcceptConnectPort,22_2_0000022ED1F5334C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F52B00 NtAcceptConnectPort,22_2_0000022ED1F52B00
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F42E90 NtQuerySystemInformation,free,malloc,NtQuerySystemInformation,22_2_00007DF480F42E90
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F725D4 NtQuerySystemInformation,NtQuerySystemInformation,22_2_00007DF480F725D4
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C53854 NtQuerySystemInformation,23_2_000002CE37C53854
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_3_7FC6042F NtAllocateVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,24_3_7FC6042F
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_3_7FC6066F NtProtectVirtualMemory,24_3_7FC6066F
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_010F7FAB NtAllocateVirtualMemory,NtProtectVirtualMemory,24_2_010F7FAB
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3FFD38: CreateFileW,DeviceIoControl,CloseHandle,24_2_6D3FFD38
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D37700B OpenSCManagerW,OpenServiceW,DeleteService,CloseServiceHandle,CloseServiceHandle,24_2_6D37700B
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D36F189 CreateProcessAsUserW,24_2_6D36F189
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0422A8C00_2_0422A8C0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B8DCF00_2_06B8DCF0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B8B4600_2_06B8B460
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B890780_2_06B89078
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B890690_2_06B89069
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F428380_2_06F42838
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F4E7180_2_06F4E718
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F4E7090_2_06F4E709
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F4E1900_2_06F4E190
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F4E1820_2_06F4E182
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F42BC10_2_06F42BC1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F42B4A0_2_06F42B4A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F42B100_2_06F42B10
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F42B010_2_06F42B01
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F42B0E0_2_06F42B0E
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F434330_2_06F43433
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F430460_2_06F43046
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F43FC00_2_06F43FC0
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F43BE10_2_06F43BE1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F43B300_2_06F43B30
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D252E15_3_00000218A68D252E
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D27D315_3_00000218A68D27D3
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D5EC815_3_00000218A68D5EC8
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D55C815_3_00000218A68D55C8
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D594815_3_00000218A68D5948
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D1BDD15_3_00000218A68D1BDD
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D2C7315_3_00000218A68D2C73
                      Source: C:\Windows\System32\svchost.exeCode function: 15_3_00000218A68D4A8415_3_00000218A68D4A84
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00000218A63D0C7015_2_00000218A63D0C70
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E8404015_2_00007DF4E0E84040
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9136415_2_00007DF4E0E91364
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E7286C15_2_00007DF4E0E7286C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EACD7415_2_00007DF4E0EACD74
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E7105815_2_00007DF4E0E71058
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0ECD05015_2_00007DF4E0ECD050
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EC6FB015_2_00007DF4E0EC6FB0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E75FA015_2_00007DF4E0E75FA0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5DFB415_2_00007DF4E0F5DFB4
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5EFBC15_2_00007DF4E0F5EFBC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EDD10015_2_00007DF4E0EDD100
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F6C01015_2_00007DF4E0F6C010
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0ECF0C415_2_00007DF4E0ECF0C4
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EC40B415_2_00007DF4E0EC40B4
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EA525415_2_00007DF4E0EA5254
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EDD21015_2_00007DF4E0EDD210
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5F35415_2_00007DF4E0F5F354
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0ED034415_2_00007DF4E0ED0344
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F4E1EC15_2_00007DF4E0F4E1EC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5C4B015_2_00007DF4E0F5C4B0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E8F40815_2_00007DF4E0E8F408
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5E4EC15_2_00007DF4E0F5E4EC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F6C52C15_2_00007DF4E0F6C52C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E8250015_2_00007DF4E0E82500
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EDD66815_2_00007DF4E0EDD668
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EED61015_2_00007DF4E0EED610
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EC56C015_2_00007DF4E0EC56C0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5E90815_2_00007DF4E0F5E908
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EE178415_2_00007DF4E0EE1784
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F1A79015_2_00007DF4E0F1A790
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EB891015_2_00007DF4E0EB8910
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9D8B815_2_00007DF4E0E9D8B8
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F52A7C15_2_00007DF4E0F52A7C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EC5A0C15_2_00007DF4E0EC5A0C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E7F9A015_2_00007DF4E0E7F9A0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E9198C15_2_00007DF4E0E9198C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E91B5415_2_00007DF4E0E91B54
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5A9E415_2_00007DF4E0F5A9E4
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EF0AE415_2_00007DF4E0EF0AE4
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F3DC7815_2_00007DF4E0F3DC78
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EE5BEC15_2_00007DF4E0EE5BEC
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F7BD3015_2_00007DF4E0F7BD30
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F78D6415_2_00007DF4E0F78D64
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EC3D2815_2_00007DF4E0EC3D28
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F64C7015_2_00007DF4E0F64C70
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F11D7C15_2_00007DF4E0F11D7C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F57D9415_2_00007DF4E0F57D94
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0EDCF2415_2_00007DF4E0EDCF24
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F5EE3C15_2_00007DF4E0F5EE3C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F97E4C15_2_00007DF4E0F97E4C
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0ED0EA015_2_00007DF4E0ED0EA0
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E87E7415_2_00007DF4E0E87E74
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309FD61018_2_00000267309FD610
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309ED66818_2_00000267309ED668
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309F178418_2_00000267309F1784
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_000002673098176E18_2_000002673098176E
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309D56C018_2_00000267309D56C0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_000002673098286C18_2_000002673098286C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A2A79018_2_0000026730A2A790
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309C891018_2_00000267309C8910
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6E90818_2_0000026730A6E908
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309AD8B818_2_00000267309AD8B8
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309D5A0C18_2_00000267309D5A0C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A62A7C18_2_0000026730A62A7C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_000002673098F9A018_2_000002673098F9A0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309A198C18_2_00000267309A198C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6A9E418_2_0000026730A6A9E4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309A1B5418_2_00000267309A1B54
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A4DC7818_2_0000026730A4DC78
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309F5BEC18_2_00000267309F5BEC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309D3D2818_2_00000267309D3D28
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309BCD7418_2_00000267309BCD74
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A88D6418_2_0000026730A88D64
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6EE3C18_2_0000026730A6EE3C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730997E7418_2_0000026730997E74
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A67D9418_2_0000026730A67D94
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309ECF2418_2_00000267309ECF24
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309E0EA018_2_00000267309E0EA0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A7C01018_2_0000026730A7C010
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730AAF00818_2_0000026730AAF008
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_000002673098105818_2_0000026730981058
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309DD05018_2_00000267309DD050
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730985FA018_2_0000026730985FA0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6DFB418_2_0000026730A6DFB4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6EFBC18_2_0000026730A6EFBC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309D6FB018_2_00000267309D6FB0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309DF0C418_2_00000267309DF0C4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309D40B418_2_00000267309D40B4
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309ED10018_2_00000267309ED100
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309ED21018_2_00000267309ED210
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A5E1EC18_2_0000026730A5E1EC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309E034418_2_00000267309E0344
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_00000267309A136418_2_00000267309A1364
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6F35418_2_0000026730A6F354
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_000002673099F40818_2_000002673099F408
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A7C52C18_2_0000026730A7C52C
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_0000026730A6E4EC18_2_0000026730A6E4EC
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeCode function: 18_2_000002673099250018_2_0000026730992500
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F34EFC22_3_00007DF480F34EFC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3220422_3_00007DF480F32204
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3220422_3_00007DF480F32204
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3252022_3_00007DF480F32520
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3392C22_3_00007DF480F3392C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2147C22_3_00007DF480F2147C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F21AD022_3_00007DF480F21AD0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2383822_3_00007DF480F23838
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2769C22_3_00007DF480F2769C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2B0B422_3_00007DF480F2B0B4
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F236F022_3_00007DF480F236F0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2BD1022_3_00007DF480F2BD10
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2FB1422_3_00007DF480F2FB14
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2A91822_3_00007DF480F2A918
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3252022_3_00007DF480F32520
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2A32822_3_00007DF480F2A328
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3392C22_3_00007DF480F3392C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3392C22_3_00007DF480F3392C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3392C22_3_00007DF480F3392C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3392C22_3_00007DF480F3392C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3394222_3_00007DF480F33942
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2554022_3_00007DF480F25540
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2AD5422_3_00007DF480F2AD54
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F25F6822_3_00007DF480F25F68
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2B5A022_3_00007DF480F2B5A0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F29FAC22_3_00007DF480F29FAC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F259DC22_3_00007DF480F259DC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F307E822_3_00007DF480F307E8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3220422_3_00007DF480F32204
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F3220422_3_00007DF480F32204
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2323C22_3_00007DF480F2323C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2C64022_3_00007DF480F2C640
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2CC4422_3_00007DF480F2CC44
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2F25422_3_00007DF480F2F254
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC1F4022_3_0000022ED3AC1F40
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC171622_3_0000022ED3AC1716
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC366C22_3_0000022ED3AC366C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_0000022ED3AC028322_3_0000022ED3AC0283
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F4262822_2_0000022ED1F42628
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5340C22_2_0000022ED1F5340C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F4C30822_2_0000022ED1F4C308
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F70E3022_2_0000022ED1F70E30
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5E5F422_2_0000022ED1F5E5F4
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F86DF422_2_0000022ED1F86DF4
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7D5E822_2_0000022ED1F7D5E8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F74D4422_2_0000022ED1F74D44
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F414D022_2_0000022ED1F414D0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5ECA822_2_0000022ED1F5ECA8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5D06022_2_0000022ED1F5D060
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F6906C22_2_0000022ED1F6906C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F6485C22_2_0000022ED1F6485C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F6803C22_2_0000022ED1F6803C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5C7C822_2_0000022ED1F5C7C8
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F757A022_2_0000022ED1F757A0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F79F8C22_2_0000022ED1F79F8C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5777022_2_0000022ED1F57770
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F75F6822_2_0000022ED1F75F68
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F8175022_2_0000022ED1F81750
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5FF2822_2_0000022ED1F5FF28
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F676D022_2_0000022ED1F676D0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7F6A422_2_0000022ED1F7F6A4
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F67A4C22_2_0000022ED1F67A4C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F8123422_2_0000022ED1F81234
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F6E20C22_2_0000022ED1F6E20C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7B1DC22_2_0000022ED1F7B1DC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F561BC22_2_0000022ED1F561BC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5D92022_2_0000022ED1F5D920
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7492822_2_0000022ED1F74928
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7688022_2_0000022ED1F76880
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F4108D22_2_0000022ED1F4108D
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F80C3022_2_0000022ED1F80C30
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F5742422_2_0000022ED1F57424
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F8440D22_2_0000022ED1F8440D
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7540822_2_0000022ED1F75408
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F743F022_2_0000022ED1F743F0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7FB9022_2_0000022ED1F7FB90
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7F34422_2_0000022ED1F7F344
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F8030022_2_0000022ED1F80300
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F762D022_2_0000022ED1F762D0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F60A8422_2_0000022ED1F60A84
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F7528822_2_0000022ED1F75288
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F50E7422_2_00007DF480F50E74
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F59C7422_2_00007DF480F59C74
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F4F8E022_2_00007DF480F4F8E0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F5152C22_2_00007DF480F5152C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F527AC22_2_00007DF480F527AC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F4F04822_2_00007DF480F4F048
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F5728D22_2_00007DF480F5728D
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F5330822_2_00007DF480F53308
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F501A022_2_00007DF480F501A0
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F7848022_2_00007DF480F78480
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F78FDC22_2_00007DF480F78FDC
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F7720022_2_00007DF480F77200
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F79C1822_2_00007DF480F79C18
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_00007DF480F922CC22_2_00007DF480F922CC
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6A86023_2_000002CE37C6A860
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6981823_2_000002CE37C69818
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C5BFE423_2_000002CE37C5BFE4
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C627A423_2_000002CE37C627A4
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6F76C23_2_000002CE37C6F76C
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C68EB823_2_000002CE37C68EB8
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C7C66823_2_000002CE37C7C668
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C7466023_2_000002CE37C74660
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6AE1023_2_000002CE37C6AE10
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C5C5D423_2_000002CE37C5C5D4
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C58DF423_2_000002CE37C58DF4
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C5D60423_2_000002CE37C5D604
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C81E0823_2_000002CE37C81E08
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C725B423_2_000002CE37C725B4
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6E51C23_2_000002CE37C6E51C
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C69D3023_2_000002CE37C69D30
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6A4F823_2_000002CE37C6A4F8
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C7C50023_2_000002CE37C7C500
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C5BC6823_2_000002CE37C5BC68
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C653C823_2_000002CE37C653C8
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C5737C23_2_000002CE37C5737C
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C73B4023_2_000002CE37C73B40
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C72AA023_2_000002CE37C72AA0
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C7225423_2_000002CE37C72254
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C7321023_2_000002CE37C73210
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6999823_2_000002CE37C69998
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C6898023_2_000002CE37C68980
                      Source: C:\Windows\System32\dllhost.exeCode function: 23_2_000002CE37C7414423_2_000002CE37C74144
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_3_7FC6146624_3_7FC61466
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_3_7FC6066F24_3_7FC6066F
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_3_7FC61E7A24_3_7FC61E7A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_3_7FC6243A24_3_7FC6243A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5313124_2_00C53131
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C61F4D24_2_00C61F4D
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3AACCE24_2_6D3AACCE
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D47295A24_2_6D47295A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4A497724_2_6D4A4977
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4925B924_2_6D4925B9
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D48C7FA24_2_6D48C7FA
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D46466724_2_6D464667
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D49A6E024_2_6D49A6E0
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D49212D24_2_6D49212D
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D48E1F024_2_6D48E1F0
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4A019E24_2_6D4A019E
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D49235C24_2_6D49235C
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D491EFE24_2_6D491EFE
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D47F55924_2_6D47F559
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D46570424_2_6D465704
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4637E424_2_6D4637E4
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4773D924_2_6D4773D9
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_010F754924_2_010F7549
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FACEE4624_2_7FACEE46
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FACE48724_2_7FACE487
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FB13F8824_2_7FB13F88
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FB18FDA24_2_7FB18FDA
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FB14F0024_2_7FB14F00
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FB14E8424_2_7FB14E84
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FAEADBA24_2_7FAEADBA
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FB0BD2024_2_7FB0BD20
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FB11D7124_2_7FB11D71
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D362FB3 appears 187 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D489AF0 appears 45 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D374396 appears 70 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D36DC4E appears 45 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D49397D appears 43 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D36DC24 appears 66 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D36589B appears 190 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D3F4DE0 appears 45 times
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: String function: 6D365B56 appears 39 times
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 496
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@32/11@8/11
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D36C9A2 GetLastError,SetLastError,FormatMessageW,GetLastError,SetLastError,LocalFree,24_2_6D36C9A2
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D36F3BF GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,24_2_6D36F3BF
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,24_2_6D377EA9
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,24_2_6D377B61
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E7286C CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,SuspendThread,15_2_00007DF4E0E7286C
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_3_00007DF480F2147C CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoUninitialize,22_3_00007DF480F2147C
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C56329 LoadResource,LockResource,SizeofResource,24_2_00C56329
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D376F73 OpenSCManagerW,OpenServiceW,ChangeServiceConfig2W,CloseServiceHandle,CloseServiceHandle,24_2_6D376F73
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3775C3 StartServiceCtrlDispatcherW,GetLastError,WaitForSingleObject,CloseHandle,24_2_6D3775C3
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D377667 StartServiceCtrlDispatcherW,GetLastError,WaitForSingleObject,CloseHandle,24_2_6D377667
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeMutant created: \Sessions\1\BaseNamedObjects\Global\GS-1-5-21-2246122658-3693405117-2476756634-1002{D19BAF17-7C87-467E-8D63-6C4B1C836373}
                      Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-7414dff8-ea62-6e9bec-ac73e80114b7}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5324:64:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Ffycyc
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_elzxg11h.uju.ps1Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCommand line argument: kernel32.dll24_2_00C56A08
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCommand line argument: DllEntry24_2_00C56A08
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: svchost.exe, 0000000F.00000003.2089162032.00000218A6E59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.2089226896.00000218A6F59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: svchost.exe, 0000000F.00000003.1901555540.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2414088105.00007DF4E0FA1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413475957.00000218AA3D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1903727256.00000218AA010000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2413648742.00000218AA550000.00000004.00000020.00020000.00000000.sdmp, chrome.exe, chrome.exe, 00000012.00000002.2073722507.0000026730980000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: 1.ps1ReversingLabs: Detection: 29%
                      Source: AvastBrowserUpdate.exeString found in binary or memory: /installerdata=
                      Source: AvastBrowserUpdate.exeString found in binary or memory: https://www.google.com/support/installer/?
                      Source: AvastBrowserUpdate.exeString found in binary or memory: Application update/install
                      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1.ps1"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\1.ps1"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 496
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chr2E95.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/d4a75c5f/4a1b3c1a"
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2188,i,10742310718371479009,15157293769129927295,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:3
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Media Player\wmpshare.exe "C:\Program Files\Windows Media Player\wmpshare.exe"
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe --user-data-dir="C:\Users\user\AppData\Local\Temp\chr2E95.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/d4a75c5f/4a1b3c1a"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Media Player\wmpshare.exe "C:\Program Files\Windows Media Player\wmpshare.exe"Jump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2188,i,10742310718371479009,15157293769129927295,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:3Jump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\dllhost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\dllhost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\dllhost.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbgcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dbgcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: 1.ps1Static file information: File size 9742301 > 1048576
                      Source: Binary string: wkernel32.pdb source: svchost.exe, 0000000B.00000003.1789625687.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789690528.0000000005910000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: svchost.exe, 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: powershell.exe, 00000000.00000002.1786845908.00000000069E0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: svchost.exe, 0000000B.00000003.1787834240.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1788496088.00000000059E0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973260532.00000267327B0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973101219.00000267325C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: svchost.exe, 0000000B.00000003.1789056248.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789443974.0000000005990000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: svchost.exe, 0000000B.00000003.1787834240.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1788496088.00000000059E0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973260532.00000267327B0000.00000004.00000001.00020000.00000000.sdmp, chrome.exe, 00000012.00000003.1973101219.00000267325C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: powershell.exe, 00000000.00000002.1786845908.00000000069E0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: svchost.exe, 0000000B.00000003.1789056248.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789443974.0000000005990000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: chrome_elf.dll.pdb source: chrome.exe, 00000012.00000002.2074551064.00007FFCA130F000.00000002.00000001.01000000.0000000E.sdmp
                      Source: Binary string: AvastBrowserUpdate_unsigned.pdb source: AvastBrowserUpdate.exe
                      Source: Binary string: wkernelbase.pdbUGP source: svchost.exe, 0000000B.00000003.1790007214.0000000005A10000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernel32.pdbUGP source: svchost.exe, 0000000B.00000003.1789625687.00000000057F0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1789690528.0000000005910000.00000004.00000001.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.powershell.exe.69e0000.4.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: 15.2.svchost.exe.218a6cbc070.1.raw.unpack, Runtime.cs.Net Code: CoreMain System.Reflection.Assembly.Load(byte[])
                      Source: 15.2.svchost.exe.218a6cbc070.1.raw.unpack, Runtime.cs.Net Code: CoreMain
                      Source: Yara matchFile source: 0.2.powershell.exe.61ab0d0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.616b8e4.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.6118a90.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.61ab0d0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1771943733.0000000005A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7800, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7800, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D47447A CloseHandle,InitializeCriticalSection,CreateSemaphoreW,CreateSemaphoreW,CreateSemaphoreW,CreateThread,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,InitializeCriticalSection,EnterCriticalSection,SetUnhandledExceptionFilter,__set_purecall_handler,LeaveCriticalSection,24_2_6D47447A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B835B2 push esp; ret 0_2_06B835B1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B835AA push esp; ret 0_2_06B835B1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B835F0 pushfd ; ret 0_2_06B835F1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B84202 push eax; retf 0_2_06B84209
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B83BF6 push es; ret 0_2_06B83C04
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06B8731D push es; ret 0_2_06B87328
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F41112 push eax; retf 0_2_06F41131
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_07064208 pushfd ; retf 0_2_0706420A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_07064216 pushfd ; retf 0_2_07064217
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0706A028 push ss; iretd 0_2_0706A72A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_0706B85F push ss; iretd 0_2_0706B862
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B310F9 push FFFFFF82h; iretd 10_2_00B310FB
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B344F9 push edx; retf 10_2_00B344FC
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B328EC push edi; ret 10_2_00B328F8
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B32C39 push ecx; ret 10_2_00B32C59
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B3525D push es; ret 10_2_00B35264
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B33F89 push edi; iretd 10_2_00B33F96
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B33FD4 push ss; retf 10_2_00B33FF5
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B321DC push eax; ret 10_2_00B321DD
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B30F6A push eax; ret 10_2_00B30F75
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B34D5E push esi; ret 10_2_00B34D69
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_0328296C push edi; ret 11_3_03282978
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03281179 push FFFFFF82h; iretd 11_3_0328117B
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03284579 push edx; retf 11_3_0328457C
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03280FEA push eax; ret 11_3_03280FF5
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03284DDE push esi; ret 11_3_03284DE9
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03284009 push edi; iretd 11_3_03284016
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_0328225C push eax; ret 11_3_0328225D
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03284054 push ss; retf 11_3_03284075
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03282CB9 push ecx; ret 11_3_03282CD9
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_032852DD push es; ret 11_3_032852E4
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeFile created: C:\Users\user\AppData\Roaming\Avt\goopdate.dllJump to dropped file
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeFile created: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D364222 GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileStringW,_wcslen,GetPrivateProfileIntW,24_2_6D364222
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D468366 OpenSCManagerW,OpenServiceW,QueryServiceStatus,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,24_2_6D468366
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\avt CfgDataJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAPI/Special instruction interceptor: Address: 7FFCC372D044
                      Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFCC372D044
                      Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 5B4B83A
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EVERYWHERE.EXEFIDDLER.EXEIDA.EXEIDA64.EXEIMMU
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEPROCESSHA
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TORUNS.EXEDUMPCAP.EXEDE4
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0F74248 sldt word ptr [eax]15_2_00007DF4E0F74248
                      Source: C:\Windows\System32\dllhost.exeCode function: GetAdaptersInfo,23_2_000002CE37C52AC4
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5242Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4432Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Avt\goopdate.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeAPI coverage: 7.1 %
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7504Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 8112Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E91618 FindFirstFileW,DeleteFileW,FindNextFileW,RemoveDirectoryW,15_2_00007DF4E0E91618
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5C126 FindFirstFileExW,24_2_00C5C126
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D396118 FindFirstFileW,FindClose,FindNextFileW,24_2_6D396118
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3678C0 FindFirstFileW,GetLastError,_wcslen,DeleteFileW,FindNextFileW,GetLastError,FindClose,24_2_6D3678C0
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D367A07 GetFileAttributesW,GetLastError,_wcslen,FindFirstFileW,GetLastError,_wcslen,_wcslen,FindNextFileW,FindClose,RemoveDirectoryW,24_2_6D367A07
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D369507 FindFirstFileW,FindNextFileW,FindClose,24_2_6D369507
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D38944D FindFirstFileW,FindNextFileW,FindClose,24_2_6D38944D
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D367789 FindFirstFileW,FindNextFileW,GetLastError,FindClose,24_2_6D367789
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D36D6DE FindFirstFileW,FindNextFileW,FindClose,24_2_6D36D6DE
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3A92EE FindFirstFileW,GetLastError,PathStripPathW,PathStripPathW,PathStripPathW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,FindNextFileW,GetLastError,FindClose,24_2_6D3A92EE
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D371FC7 GetLogicalDriveStringsW,QueryDosDeviceW,_wcslen,_wcslen,24_2_6D371FC7
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_06F40B30 GetSystemInfo,0_2_06F40B30
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\AdobeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcrobatJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DCJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIAJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: svchost.exe, 0000000F.00000003.2090493075.00000218A6CE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinkmbolicLinkSymbolicLink
                      Source: svchost.exe, 0000000B.00000002.1854254504.0000000003669000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MSAFD RfComm [Bluetooth]Hyper-V RAWen-USen-GBn
                      Source: svchost.exe, 0000000F.00000003.2090493075.00000218A6CE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinkLinkcLinkSymbolicLink
                      Source: svchost.exe, 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                      Source: svchost.exe, 00000003.00000002.2414193823.00000181D085A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2412027728.00000181CB22B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.1848907236.0000000003612000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2409515543.00000218A6413000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000B.00000002.1848907236.0000000003612000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                      Source: svchost.exe, 0000000F.00000002.2409515543.00000218A6413000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@ C
                      Source: svchost.exe, 0000000B.00000003.1789842064.00000000057F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                      Source: svchost.exe, 0000000B.00000002.1855883981.00000000038E0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: >=VmcI-
                      Source: svchost.exe, 0000000F.00000002.2409774124.00000218A642F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWMSAFD RfComm [Bluetooth]RSVP UDP Service Provider
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B30098 LdrInitializeThunk,VirtualFree,10_2_00B30098
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C570C0 IsDebuggerPresent,OutputDebugStringW,24_2_00C570C0
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D47447A CloseHandle,InitializeCriticalSection,CreateSemaphoreW,CreateSemaphoreW,CreateSemaphoreW,CreateThread,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,InitializeCriticalSection,EnterCriticalSection,SetUnhandledExceptionFilter,__set_purecall_handler,LeaveCriticalSection,24_2_6D47447A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00B30277 mov eax, dword ptr fs:[00000030h]10_2_00B30277
                      Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_3_03280283 mov eax, dword ptr fs:[00000030h]11_3_03280283
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5BE58 mov eax, dword ptr fs:[00000030h]24_2_00C5BE58
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5A765 mov eax, dword ptr fs:[00000030h]24_2_00C5A765
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D496064 mov eax, dword ptr fs:[00000030h]24_2_6D496064
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4AB4BF mov esi, dword ptr fs:[00000030h]24_2_6D4AB4BF
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_010F7BBC mov eax, dword ptr fs:[00000030h]24_2_010F7BBC
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_7FAC1E9F mov eax, dword ptr fs:[00000030h]24_2_7FAC1E9F
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5643F GetProcessHeap,__Init_thread_footer,__Init_thread_footer,24_2_00C5643F
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C57878 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00C57878
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5799A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00C5799A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C5A14C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00C5A14C
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C57B31 SetUnhandledExceptionFilter,24_2_00C57B31
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D47447A CloseHandle,InitializeCriticalSection,CreateSemaphoreW,CreateSemaphoreW,CreateSemaphoreW,CreateThread,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,InitializeCriticalSection,EnterCriticalSection,SetUnhandledExceptionFilter,__set_purecall_handler,LeaveCriticalSection,24_2_6D47447A
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D474720 FreeLibrary,FreeLibrary,FreeLibrary,EnterCriticalSection,SetUnhandledExceptionFilter,__set_purecall_handler,_Deallocate,LeaveCriticalSection,DeleteCriticalSection,ReleaseSemaphore,WaitForSingleObject,CloseHandle,CloseHandle,DeleteCriticalSection,CloseHandle,CloseHandle,DeleteCriticalSection,24_2_6D474720
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D474943 EnterCriticalSection,SetUnhandledExceptionFilter,__set_purecall_handler,24_2_6D474943
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4749B0 SetUnhandledExceptionFilter,__set_purecall_handler,LeaveCriticalSection,24_2_6D4749B0
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D4899CC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_6D4899CC
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D48FB98 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_6D48FB98
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D489602 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_6D489602

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\svchost.exeProcess created / APC Queued / Resumed: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 185.147.124.2 5353Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 2CE37C50000 protect: page read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: NULL target: C:\Program Files\Google\Chrome\Application\chrome.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\System32\svchost.exeThread APC queued: target process: C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeMemory written: C:\Windows\System32\dllhost.exe base: 2CE37C50000Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeMemory written: C:\Windows\System32\dllhost.exe base: 7FF6593214E0Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D368139 SetForegroundWindow,ShellExecuteExW,AllowSetForegroundWindow,GetLastError,GetLastError,DestroyWindow,SetLastError,24_2_6D368139
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Media Player\wmpshare.exe "C:\Program Files\Windows Media Player\wmpshare.exe"Jump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeProcess created: C:\Windows\System32\dllhost.exe "C:\Windows\system32\dllhost.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D3666A9 GetSecurityDescriptorDacl,SetSecurityDescriptorDacl,24_2_6D3666A9
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D370E06 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,24_2_6D370E06
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C57B9B cpuid 24_2_00C57B9B
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,24_2_6D4A8030
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetLocaleInfoW,24_2_6D4A7D33
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetLocaleInfoW,24_2_6D4A7F63
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,24_2_6D4A7E5C
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: EnumSystemLocalesW,24_2_6D4A7970
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: EnumSystemLocalesW,24_2_6D4A79BB
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetLocaleInfoW,24_2_6D4A78C7
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: EnumSystemLocalesW,24_2_6D4A7A56
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,24_2_6D4A7AE3
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: GetLocaleInfoW,24_2_6D49F76D
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,24_2_6D4A76F8
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: EnumSystemLocalesW,24_2_6D49F1F6
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\1.ps1 VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E96448 CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,15_2_00007DF4E0E96448
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_00C57DC5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,24_2_00C57DC5
                      Source: C:\Users\user\AppData\Roaming\Avt\AvastBrowserUpdate.exeCode function: 24_2_6D415D91 GetVersionExW,GetLastError,_wcslen,24_2_6D415D91
                      Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: svchost.exe, 0000000B.00000002.1854363388.0000000003700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OllyDbg.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000B.00000003.1784088434.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1793738107.00000000041E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1855883981.00000000038E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: svchost.exe, 0000000F.00000003.2092176480.00000218A6CDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %AppData%\ElectrumSV\config
                      Source: svchost.exe, 0000000F.00000003.2092817624.00000218A6CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Local\ElectronCash\config
                      Source: svchost.exe, 0000000F.00000003.2092817624.00000218A6CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %AppData%\com.liberty.jaxx
                      Source: svchost.exe, 0000000F.00000003.2092465229.00000218A6CC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: passphrase.json
                      Source: svchost.exe, 0000000F.00000003.2092465229.00000218A6CC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %AppData%\Exodus
                      Source: powershell.exe, 00000000.00000002.1790249656.0000000007120000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
                      Source: svchost.exe, 0000000F.00000002.2410325478.00000218A64AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagiJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web ApplicationsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session StorageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldoomlJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64fJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync DataJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\settings\main\ms-language-packs\browser\newtabJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\defJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\settingsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons MonochromeJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\z6bny8rn.defaultJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadataJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest ResourcesJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SessionsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\safebrowsingJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_dbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_DataJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\doomedJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnWebGPUCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_dbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\5d6e55e1-dca9-4d9b-861d-6fd45a15969dJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\settings\main\ms-language-packs\browserJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons MaskableJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285fJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service WorkerJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\extJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache\index-dirJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\startupCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfakJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dirJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local StorageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\thumbnailsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98aJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\StorageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\ProfilesJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-releaseJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\safebrowsing\google4Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhiJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\trash16598Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ClientCertificatesJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing NetworkJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2\entriesJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\discounts_dbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmiedaJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeeaJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cache2Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\jsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App SettingsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\IconsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics DatabaseJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dirJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dirJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjfJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\NetworkJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension SettingsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shared DictionaryJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Service Worker\DatabaseJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\settings\mainJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\settings\main\ms-language-packsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasmJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_dbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibagJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\EncryptionJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDBJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncmJump to behavior
                      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5148, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0000000B.00000003.1784088434.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1793738107.00000000041E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1855883981.00000000038E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\svchost.exeCode function: 15_2_00007DF4E0E96448 CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,15_2_00007DF4E0E96448
                      Source: C:\Program Files\Windows Media Player\wmpshare.exeCode function: 22_2_0000022ED1F4D070 CreateNamedPipeW,BindIoCompletionCallback,ConnectNamedPipe,22_2_0000022ED1F4D070
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      2
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      Create Account
                      1
                      DLL Side-Loading
                      3
                      Obfuscated Files or Information
                      21
                      Input Capture
                      4
                      File and Directory Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts3
                      Command and Scripting Interpreter
                      1
                      Valid Accounts
                      1
                      Extra Window Memory Injection
                      1
                      Software Packing
                      Security Account Manager146
                      System Information Discovery
                      SMB/Windows Admin Shares21
                      Input Capture
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts11
                      Scheduled Task/Job
                      14
                      Windows Service
                      1
                      Valid Accounts
                      1
                      DLL Side-Loading
                      NTDS251
                      Security Software Discovery
                      Distributed Component Object Model2
                      Clipboard Data
                      3
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts12
                      Service Execution
                      11
                      Scheduled Task/Job
                      11
                      Access Token Manipulation
                      1
                      Extra Window Memory Injection
                      LSA Secrets51
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts14
                      Windows Service
                      11
                      Masquerading
                      Cached Domain Credentials2
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items712
                      Process Injection
                      1
                      Valid Accounts
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job11
                      Scheduled Task/Job
                      1
                      Modify Registry
                      Proc Filesystem1
                      System Network Configuration Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt51
                      Virtualization/Sandbox Evasion
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                      Access Token Manipulation
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd712
                      Process Injection
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636808 Sample: 1.ps1 Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 52 x.ns.gin.ntt.net 2->52 54 usa.trendys.cloud 2->54 56 8 other IPs or domains 2->56 82 Suricata IDS alerts for network traffic 2->82 84 Antivirus detection for URL or domain 2->84 86 Multi AV Scanner detection for submitted file 2->86 88 5 other signatures 2->88 11 powershell.exe 15 20 2->11         started        15 AvastBrowserUpdate.exe 1 2->15         started        17 svchost.exe 1 1 2->17         started        19 2 other processes 2->19 signatures3 process4 dnsIp5 60 usa.trendys.cloud 172.67.166.76, 443, 49727 CLOUDFLARENETUS United States 11->60 100 Found many strings related to Crypto-Wallets (likely being stolen) 11->100 102 Injects a PE file into a foreign processes 11->102 104 Switches to a custom stack to bypass stack traces 11->104 21 powershell.exe 1 11->21         started        23 conhost.exe 11->23         started        62 ipv4.imgur.map.fastly.net 199.232.192.193 FASTLYUS United States 15->62 64 127.0.0.1 unknown unknown 17->64 signatures6 process7 process8 25 svchost.exe 21->25         started        29 WerFault.exe 4 21->29         started        dnsIp9 58 185.147.124.2, 49728, 49736, 49737 E-STYLEISP-ASRU Russian Federation 25->58 94 System process connects to network (likely due to code injection or exploit) 25->94 96 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 25->96 98 Switches to a custom stack to bypass stack traces 25->98 31 svchost.exe 3 25->31         started        signatures10 process11 dnsIp12 68 ntp1.net.berkeley.edu 169.229.128.134 UCBUS United States 31->68 70 ntp.time.nl 94.198.159.14 SIDNNL Netherlands 31->70 72 4 other IPs or domains 31->72 74 Early bird code injection technique detected 31->74 76 Found many strings related to Crypto-Wallets (likely being stolen) 31->76 78 Tries to harvest and steal browser information (history, passwords, etc) 31->78 80 2 other signatures 31->80 35 wmpshare.exe 1 3 31->35         started        39 chrome.exe 31->39         started        41 chrome.exe 31->41         started        signatures13 process14 file15 48 C:\Users\user\AppData\...\goopdate.dll, PE32 35->48 dropped 50 C:\Users\user\...\AvastBrowserUpdate.exe, PE32 35->50 dropped 90 Writes to foreign memory regions 35->90 92 Allocates memory in foreign processes 35->92 43 dllhost.exe 35->43         started        46 chrome.exe 39->46         started        signatures16 process17 dnsIp18 66 91.240.118.2, 443, 49738 GLOBALLAYERNL unknown 43->66

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.