Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Magic_V_pro_setup_stable_latest_release_version_9_709.exe

Overview

General Information

Sample name:Magic_V_pro_setup_stable_latest_release_version_9_709.exe
Analysis ID:1632503
MD5:4f4e6dd4d4b9d96e69b7f8f97e867023
SHA1:51db1de1d11976911dee96ed18b1fc903ea16676
SHA256:43b9bb932501d8d186d9fd49ee5fa1a1c47283e1db898a68b5c846eb7b971aee
Tags:exeNOBISLLCuser-SquiblydooBlog
Infos:

Detection

LummaC Stealer
Score:74
Range:0 - 100
Confidence:100%

Compliance

Score:33
Range:0 - 100

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Found malware configuration
Multi AV Scanner detection for dropped file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Drops password protected ZIP file
Found many strings related to Crypto-Wallets (likely being stolen)
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
EXE planting / hijacking vulnerabilities found
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Magic_V_pro_setup_stable_latest_release_version_9_709.exe (PID: 8088 cmdline: "C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" MD5: 4F4E6DD4D4B9D96E69B7F8F97E867023)
    • Magic_V_pro_setup_stable_latest_release_version_9_709.tmp (PID: 6796 cmdline: "C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$204BA,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" MD5: 6C66FDD38C098F271FDE6E9E74DBD0EB)
      • Magic_V_pro_setup_stable_latest_release_version_9_709.exe (PID: 7284 cmdline: "C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp- MD5: 4F4E6DD4D4B9D96E69B7F8F97E867023)
        • Magic_V_pro_setup_stable_latest_release_version_9_709.tmp (PID: 7964 cmdline: "C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$304AE,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp- MD5: 6C66FDD38C098F271FDE6E9E74DBD0EB)
          • idp.exe (PID: 3620 cmdline: "C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exe" x "C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\logs" -o"C:\Users\user\AppData\Local\Programs\Common" -y -pCC3ba8B679c926fc9911aeDE9009E589CBD3667C48439c630418D27fDbb52Fc8 MD5: 6482EE0F372469D1190C74BD70D76153)
            • conhost.exe (PID: 1460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1408 cmdline: "cmd" /c attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 1780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • attrib.exe (PID: 3384 cmdline: attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe" MD5: 0E938DD280E83B1596EC6AA48729C2B0)
          • schtasks.exe (PID: 2332 cmdline: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 2112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3148 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-GTB58.tmp.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 2812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • taskshostw.exe (PID: 2444 cmdline: C:\Users\user\AppData\Local\programs\common\taskshostw.exe C:\Windows\system32\config\systemprofile\AppData\Local\programs\common\taskshostw.exe MD5: 33645B3AFD79ED29F7E6F476D7F6ED4B)
    • chrome.exe (PID: 4364 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222 MD5: E81F54E6C1129887AEA47E7D092680BF)
      • chrome.exe (PID: 4948 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1980,i,2116874388231828041,7596599948103174128,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2252 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
      • chrome.exe (PID: 5508 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1980,i,2116874388231828041,7596599948103174128,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5208 /prefetch:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
{"C2 url": ["willpowerwav.site", "uncertainyelemz.bet", "hobbyedsmoker.live", "presentymusse.world", "deaddereaste.today", "subawhipnator.life", "privileggoe.live", "boltetuurked.digital"], "Build id": "ROmgOO--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000012.00000003.2396086907.000000000088F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000012.00000003.1631758552.0000000002990000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          Process Memory Space: taskshostw.exe PID: 2444JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            18.3.taskshostw.exe.2990000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              18.2.taskshostw.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                18.3.taskshostw.exe.2990000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222, CommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222, CommandLine|base64offset|contains: ^", Image: C:\Program Files\Google\Chrome\Application\chrome.exe, NewProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe, OriginalFileName: C:\Program Files\Google\Chrome\Application\chrome.exe, ParentCommandLine: C:\Users\user\AppData\Local\programs\common\taskshostw.exe C:\Windows\system32\config\systemprofile\AppData\Local\programs\common\taskshostw.exe, ParentImage: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe, ParentProcessId: 2444, ParentProcessName: taskshostw.exe, ProcessCommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222, ProcessId: 4364, ProcessName: chrome.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, CommandLine: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$304AE,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-, ParentImage: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, ParentProcessId: 7964, ParentProcessName: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, ProcessCommandLine: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, ProcessId: 2332, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, CommandLine: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$304AE,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-, ParentImage: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, ParentProcessId: 7964, ParentProcessName: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, ProcessCommandLine: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, ProcessId: 2332, ProcessName: schtasks.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, CommandLine: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$304AE,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-, ParentImage: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, ParentProcessId: 7964, ParentProcessName: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, ProcessCommandLine: "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f, ProcessId: 2332, ProcessName: schtasks.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T03:24:13.139658+010020283713Unknown Traffic192.168.2.549699104.17.112.233443TCP
                  2025-03-08T03:24:15.836607+010020283713Unknown Traffic192.168.2.549700164.132.58.105443TCP
                  2025-03-08T03:24:43.768819+010020283713Unknown Traffic192.168.2.549707104.21.44.37443TCP
                  2025-03-08T03:24:46.298533+010020283713Unknown Traffic192.168.2.549708104.21.44.37443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T03:24:44.444174+010020546531A Network Trojan was detected192.168.2.549707104.21.44.37443TCP
                  2025-03-08T03:24:47.315069+010020546531A Network Trojan was detected192.168.2.549708104.21.44.37443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T03:24:44.444174+010020498361A Network Trojan was detected192.168.2.549707104.21.44.37443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://rea.grupolalegion.ec/$TEAvira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/willrandom.zipdom.Avira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/willrandom.zipAvira URL Cloud: Label: malware
                  Source: https://willpowerwav.site/apiAvira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/willrandom.zipoAvira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/willrandom.zipHAvira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/willrandom.zipGAvira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/willrandom.zipG/hAvira URL Cloud: Label: malware
                  Source: https://rea.grupolalegion.ec/Avira URL Cloud: Label: malware
                  Source: willpowerwav.siteAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Local\Programs\Common\willrandom.exeAvira: detection malicious, Label: TR/AVI.Lumma.jtxjg
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["willpowerwav.site", "uncertainyelemz.bet", "hobbyedsmoker.live", "presentymusse.world", "deaddereaste.today", "subawhipnator.life", "privileggoe.live", "boltetuurked.digital"], "Build id": "ROmgOO--"}
                  Source: C:\Users\user\AppData\Local\Programs\Common\willrandom.exeReversingLabs: Detection: 66%
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: willpowerwav.site
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: uncertainyelemz.bet
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: hobbyedsmoker.live
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: presentymusse.world
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: deaddereaste.today
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: subawhipnator.life
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: privileggoe.live
                  Source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmpString decryptor: boltetuurked.digital
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeEXE: C:\Users\user\AppData\Local\Programs\Common\willrandom.exeJump to behavior

                  Compliance

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeEXE: C:\Users\user\AppData\Local\Programs\Common\willrandom.exeJump to behavior
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: certificate valid
                  Source: unknownHTTPS traffic detected: 104.17.112.233:443 -> 192.168.2.5:49699 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 164.132.58.105:443 -> 192.168.2.5:49700 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 190.92.154.206:443 -> 192.168.2.5:49701 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 190.92.154.206:443 -> 192.168.2.5:49702 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 150.171.28.254:443 -> 192.168.2.5:49703 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.44.37:443 -> 192.168.2.5:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.44.37:443 -> 192.168.2.5:49708 version: TLS 1.2
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: wntdll.pdbUGP source: taskshostw.exe, 00000012.00000002.3150093681.0000000004030000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: taskshostw.exe, 00000012.00000002.3150093681.0000000004030000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: f:\mydev\inno-download-plugin\unicode\idp.pdb source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1339202842.0000000003610000.00000004.00001000.00020000.00000000.sdmp, idp.dll.8.dr, idp.dll.6.dr
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA6CE2 __EH_prolog,FindFirstFileW,FindFirstFileW,FindFirstFileW,11_2_00DA6CE2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB3F02 lstrcpyW,lstrcpyW,lstrcatW,FindFirstFileW,PathRemoveFileSpecW,lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,CreateDirectoryW,lstrcatW,lstrcatW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,lstrcatW,CopyFileExW,lstrcpyW,lstrcatW,lstrcpyW,lstrcatW,FindNextFileW,FindClose,18_2_03FB3F02
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA7904 __EH_prolog,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW,11_2_00DA7904
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h18_2_004469B0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov eax, ebx18_2_00421260
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-000000BBh]18_2_00447A90
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 656D2358h18_2_0041ABA1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_0041ABA1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then lea ecx, dword ptr [eax+eax]18_2_00444C00
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+078CCBDEh]18_2_004475C0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then lea ecx, dword ptr [eax+27h]18_2_0041DD90
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h18_2_0041DD90
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then lea ecx, dword ptr [eax+27h]18_2_0041DD90
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ecx, byte ptr [esp+esi+0Ch]18_2_0043F640
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_0043F640
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi]18_2_00446040
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then push dword ptr [esi+14h]18_2_0041083A
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_0041083A
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [ebx+ecx-000000D2h]18_2_0042F8C9
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_004298F0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+02h]18_2_0044108A
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h18_2_004400A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [eax]18_2_004400A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 720EEED4h18_2_00443100
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-2809052Bh]18_2_00443100
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [esp+esi+27577599h]18_2_00443100
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov byte ptr [eax], cl18_2_0041D12C
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h18_2_0041D12C
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]18_2_0040A1A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov word ptr [eax], cx18_2_004201AB
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+140AC537h]18_2_00445A52
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov byte ptr [eax], cl18_2_0041C221
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h18_2_0041C221
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+38h]18_2_0042D23F
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_004232C0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ebx, byte ptr [edx]18_2_0043CAD0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov dword ptr [esp+08h], edi18_2_00433ADD
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_0042C2E0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], esi18_2_00446AE0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+578BD47Eh]18_2_0040FAFA
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+02h]18_2_00440A80
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+02h]18_2_00440A80
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_0040EB00
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]18_2_00426380
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_00429BA0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-72CBAB97h]18_2_0041FBB0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov edx, ecx18_2_0042C3BD
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_0042C3BD
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ebx, ecx18_2_00444C40
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then lea ecx, dword ptr [eax+eax]18_2_00444C40
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then push esi18_2_00425453
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov word ptr [esi], cx18_2_00424C60
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov byte ptr [ecx], bl18_2_0043347A
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov eax, edx18_2_00423400
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov word ptr [ecx], dx18_2_00447CB0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_00429D50
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [edx]18_2_00445553
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-2809055Fh]18_2_00411D78
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then jmp dword ptr [0044EA9Ch]18_2_0042E534
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [edx]18_2_004025A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ecx, eax18_2_00411E6A
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax-7Dh]18_2_00411605
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax+27DDFCF1h]18_2_0042BE06
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]18_2_00418E80
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+06h]18_2_004206A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+20h]18_2_0041A757
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]18_2_00402770
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], CA198B66h18_2_0042BF10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]18_2_0042FF10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-000000ECh]18_2_0042B7C8
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov byte ptr [edi], al18_2_00433FCE
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+00000170h]18_2_00433FCE
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ebx, byte ptr [edi+ecx-70AAEE47h]18_2_00411FF7
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then mov byte ptr [edi], al18_2_00433FCC
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+00000170h]18_2_00433FCC
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]18_2_0040A7A0

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49708 -> 104.21.44.37:443
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49707 -> 104.21.44.37:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49707 -> 104.21.44.37:443
                  Source: Malware configuration extractorURLs: willpowerwav.site
                  Source: Malware configuration extractorURLs: uncertainyelemz.bet
                  Source: Malware configuration extractorURLs: hobbyedsmoker.live
                  Source: Malware configuration extractorURLs: presentymusse.world
                  Source: Malware configuration extractorURLs: deaddereaste.today
                  Source: Malware configuration extractorURLs: subawhipnator.life
                  Source: Malware configuration extractorURLs: privileggoe.live
                  Source: Malware configuration extractorURLs: boltetuurked.digital
                  Source: Joe Sandbox ViewIP Address: 164.132.58.105 164.132.58.105
                  Source: Joe Sandbox ViewIP Address: 190.92.154.206 190.92.154.206
                  Source: Joe Sandbox ViewIP Address: 104.17.112.233 104.17.112.233
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49699 -> 104.17.112.233:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49700 -> 164.132.58.105:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 104.21.44.37:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.44.37:443
                  Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                  Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                  Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
                  Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
                  Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
                  Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
                  Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
                  Source: unknownTCP traffic detected without corresponding DNS query: 151.101.2.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 151.101.194.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 151.101.2.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 151.101.194.133
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
                  Source: unknownTCP traffic detected without corresponding DNS query: 150.171.28.254
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004215A0 recv,18_2_004215A0
                  Source: global trafficHTTP traffic detected: GET /y7yju2tp HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)rentry-auth: e9700e0e5dfc56e362dbe75fHost: tinyurl.com
                  Source: global trafficHTTP traffic detected: GET /cc3ba8b679c926fc9911aede9009e589cbd3667c48439c630418d27fdbb52fc8/raw HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)rentry-auth: e9700e0e5dfc56e362dbe75fHost: rentry.org
                  Source: global trafficHTTP traffic detected: GET /willrandom.zip HTTP/1.1Accept: */*User-Agent: InnoDownloadPlugin/1.5Host: rea.grupolalegion.ecConnection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiJo8sBCIWgzQEI9s/OAQiA1s4BCNLgzgEIr+TOAQji5M4BCIvlzgE=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
                  Source: global trafficHTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
                  Source: global trafficHTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiJo8sBCIWgzQEI9s/OAQiA1s4BCNLgzgEIr+TOAQji5M4BCIvlzgE=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
                  Source: global trafficHTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
                  Source: global trafficDNS traffic detected: DNS query: tinyurl.com
                  Source: global trafficDNS traffic detected: DNS query: rentry.org
                  Source: global trafficDNS traffic detected: DNS query: rea.grupolalegion.ec
                  Source: global trafficDNS traffic detected: DNS query: willpowerwav.site
                  Source: global trafficDNS traffic detected: DNS query: www.google.com
                  Source: global trafficDNS traffic detected: DNS query: apis.google.com
                  Source: global trafficDNS traffic detected: DNS query: play.google.com
                  Source: global trafficDNS traffic detected: DNS query: beacons.gcp.gvt2.com
                  Source: global trafficDNS traffic detected: DNS query: beacons.gvt2.com
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: willpowerwav.site
                  Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Sat, 08 Mar 2025 02:24:44 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nw%2BrrGexu21wrSjvOafKjW%2FM4UHgcWJvFw4O6fmZUkHfR%2FFXDPad%2FvXQyhSi5vSzv8%2B1Nptdni2BALZpNb0jJfLvjJ5%2BZeN6o1uDYrQNC088AwTLfa%2F%2FW%2Fht1VUumGzwxhBFaw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cee0c3ab2545ef-DFW
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1339622331.000000007F520000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1336232678.000000007F3D0000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1462611982.000000007D840000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1/innosetup/index.htm
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1352839840.000000000018F000.00000004.00000010.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1339202842.0000000003610000.00000004.00001000.00020000.00000000.sdmp, idp.dll.8.dr, idp.dll.6.drString found in binary or memory: http://bitbucket.org/mitrich_k/inno-download-plugin
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1339622331.000000007F520000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1338285278.000000007F4C0000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1462611982.000000007D840000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1472944582.000000007E170000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://jrsoftware.github.io/issrc/ISHelper/isxfunc.xml
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1352839840.000000000018F000.00000004.00000010.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1339202842.0000000003610000.00000004.00001000.00020000.00000000.sdmp, idp.dll.8.dr, idp.dll.6.drString found in binary or memory: http://mitrichsoftware.wordpress.comB
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1547354462.0000000002462000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsoft.coa7F
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                  Source: chromecache_130.22.drString found in binary or memory: http://www.broofa.com
                  Source: taskshostw.exe, 00000012.00000000.1498144148.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, taskshostw.exe, 00000012.00000003.1634530071.0000000002A90000.00000004.00000800.00020000.00000000.sdmp, willrandom.exe.11.drString found in binary or memory: http://www.freepdfeditor.net
                  Source: taskshostw.exe, 00000012.00000000.1498144148.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, taskshostw.exe, 00000012.00000003.1634530071.0000000002A90000.00000004.00000800.00020000.00000000.sdmp, willrandom.exe.11.drString found in binary or memory: http://www.freepdfeditor.netj
                  Source: taskshostw.exe, 00000012.00000000.1498144148.0000000000401000.00000020.00000001.01000000.0000000E.sdmp, taskshostw.exe, 00000012.00000003.1634530071.0000000002A90000.00000004.00000800.00020000.00000000.sdmp, willrandom.exe.11.drString found in binary or memory: http://www.freepdfeditor.netopenU
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1275847273.0000000002520000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1276579889.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000000.1277900136.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.3.dr, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.7.drString found in binary or memory: http://www.innosetup.com/
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1358117029.000000000235C000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000007.00000003.1704366229.0000000002271000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.kymoto.org0
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1274455155.0000000002520000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1358117029.000000000235C000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1351245017.00000000023D9000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1280450486.00000000033F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.kymoto.orgAbout
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1351245017.00000000023BD000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1547354462.00000000023ED000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.kymoto.orgq
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1275847273.0000000002520000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1276579889.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000000.1277900136.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.3.dr, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.7.drString found in binary or memory: http://www.remobjects.com/ps
                  Source: chromecache_128.22.drString found in binary or memory: https://accounts.google.com/o/oauth2/auth
                  Source: chromecache_128.22.drString found in binary or memory: https://accounts.google.com/o/oauth2/postmessageRelay
                  Source: chromecache_128.22.dr, chromecache_130.22.drString found in binary or memory: https://apis.google.com
                  Source: chromecache_128.22.drString found in binary or memory: https://clients6.google.com
                  Source: chromecache_128.22.drString found in binary or memory: https://content.googleapis.com
                  Source: chromecache_128.22.drString found in binary or memory: https://domains.google.com/suggest/flow
                  Source: chromecache_130.22.drString found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/alert/v11/gm_grey200-36dp/2x/gm_alert_gm_grey200_3
                  Source: chromecache_130.22.drString found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/alert/v11/gm_grey600-36dp/2x/gm_alert_gm_grey600_3
                  Source: chromecache_130.22.drString found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/close/v19/gm_grey200-24dp/1x/gm_close_gm_grey200_2
                  Source: chromecache_130.22.drString found in binary or memory: https://fonts.gstatic.com/s/i/googlematerialicons/close/v19/gm_grey600-24dp/1x/gm_close_gm_grey600_2
                  Source: chromecache_130.22.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
                  Source: chromecache_128.22.drString found in binary or memory: https://plus.google.com
                  Source: chromecache_128.22.drString found in binary or memory: https://plus.googleapis.com
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000942000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.000000000097E000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1461493380.000000000098A000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000983000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000002.1701339323.000000000098C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1461493380.000000000098A000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000983000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000002.1701339323.000000000098C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/$TE
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1461493380.0000000000996000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.000000000097D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/willrandom.zip
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/willrandom.zipG
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.000000000090A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/willrandom.zipG/h
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/willrandom.zipH
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1508560173.0000000003F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/willrandom.zipdom.
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rea.grupolalegion.ec/willrandom.zipo
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rentry.org/
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rentry.org/.
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000977000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rentry.org/cc3ba8b679c926fc9911aede9009e589cbd3667
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rentry.org/cc3ba8b679c926fc9911aede9009e589cbd3667c48439c630418d27fdbb52fc8/raw
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rentry.org/cc3ba8b679c926fc9911aede9009e589cbd3667c48439c630418d27fdbb52fc8/rawLocationETagA
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000919000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.00000000008E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tinyurl.com/
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000002.1701339323.00000000008A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tinyurl.com/l
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000002.1701339323.00000000008A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tinyurl.com/x
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tinyurl.com/y7yju2tp
                  Source: chromecache_128.22.drString found in binary or memory: https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
                  Source: taskshostw.exe, 00000012.00000003.2396086907.000000000088F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-.5:oV
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: chromecache_128.22.drString found in binary or memory: https://www.googleapis.com/auth/plus.me
                  Source: chromecache_128.22.drString found in binary or memory: https://www.googleapis.com/auth/plus.people.recommended
                  Source: chromecache_130.22.drString found in binary or memory: https://www.gstatic.com/gb/html/afbp.html
                  Source: chromecache_130.22.drString found in binary or memory: https://www.gstatic.com/images/icons/material/anim/mspin/mspin_googcolor_medium.css
                  Source: chromecache_130.22.drString found in binary or memory: https://www.gstatic.com/images/icons/material/anim/mspin/mspin_googcolor_small.css
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49675
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                  Source: unknownHTTPS traffic detected: 104.17.112.233:443 -> 192.168.2.5:49699 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 164.132.58.105:443 -> 192.168.2.5:49700 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 190.92.154.206:443 -> 192.168.2.5:49701 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 190.92.154.206:443 -> 192.168.2.5:49702 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 150.171.28.254:443 -> 192.168.2.5:49703 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.44.37:443 -> 192.168.2.5:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.44.37:443 -> 192.168.2.5:49708 version: TLS 1.2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043AF10 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,18_2_0043AF10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043AF10 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,18_2_0043AF10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041EDA0 CreateDesktopW,18_2_0041EDA0

                  System Summary

                  barindex
                  Source: logs.8.drZip Entry: encrypted
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB3BE3 NtWriteVirtualMemory,NtWriteVirtualMemory,18_2_03FB3BE3
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB3BD6 NtWriteVirtualMemory,NtWriteVirtualMemory,18_2_03FB3BD6
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA8752: __EH_prolog,GetFileInformationByHandle,DeviceIoControl,memcpy,11_2_00DA8752
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1ADF011_2_00E1ADF0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E06D5611_2_00E06D56
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E0CD3B11_2_00E0CD3B
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E220F011_2_00E220F0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3204011_2_00E32040
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2402011_2_00E24020
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1618011_2_00E16180
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3417011_2_00E34170
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3615011_2_00E36150
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DBA11A11_2_00DBA11A
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3811011_2_00E38110
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E302C011_2_00E302C0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E102BA11_2_00E102BA
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2427011_2_00E24270
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3A3E011_2_00E3A3E0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DF237F11_2_00DF237F
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2A4A011_2_00E2A4A0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DBC41711_2_00DBC417
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3C41011_2_00E3C410
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DBC5E611_2_00DBC5E6
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1A59011_2_00E1A590
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1C53011_2_00E1C530
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DFC50E11_2_00DFC50E
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2466011_2_00E24660
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1863011_2_00E18630
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2A75011_2_00E2A750
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2A8B011_2_00E2A8B0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1E86011_2_00E1E860
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2883011_2_00E28830
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DBE99111_2_00DBE991
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2893011_2_00E28930
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E4290011_2_00E42900
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E4491011_2_00E44910
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E44AE911_2_00E44AE9
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E42AB011_2_00E42AB0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E48A2011_2_00E48A20
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E48BE011_2_00E48BE0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E40B9011_2_00E40B90
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E02B0011_2_00E02B00
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DEECF611_2_00DEECF6
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DE8C0311_2_00DE8C03
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2AE2011_2_00E2AE20
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E40FB011_2_00E40FB0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3AF2011_2_00E3AF20
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E330E811_2_00E330E8
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1F0D011_2_00E1F0D0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E4302011_2_00E43020
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1D01011_2_00E1D010
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DFB27211_2_00DFB272
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E1937011_2_00E19370
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2131011_2_00E21310
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3B49011_2_00E3B490
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA159811_2_00DA1598
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E156A011_2_00E156A0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E2969011_2_00E29690
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E3F64011_2_00E3F640
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DF577511_2_00DF5775
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E478C011_2_00E478C0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E37AE011_2_00E37AE0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA5A8811_2_00DA5A88
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E29A8011_2_00E29A80
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DE9A5D11_2_00DE9A5D
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA1A6711_2_00DA1A67
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E21A2011_2_00E21A20
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E33A2011_2_00E33A20
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E27B3011_2_00E27B30
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E41CF011_2_00E41CF0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA9C0011_2_00DA9C00
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E33D4011_2_00E33D40
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DF9E8911_2_00DF9E89
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E39E2011_2_00E39E20
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E31FC011_2_00E31FC0
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E43F7011_2_00E43F70
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DCFF7C11_2_00DCFF7C
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041099018_2_00410990
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042126018_2_00421260
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040BA1018_2_0040BA10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040E36018_2_0040E360
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041ABA118_2_0041ABA1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041B4A418_2_0041B4A4
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00421D1018_2_00421D10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004475C018_2_004475C0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041DD9018_2_0041DD90
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004215A018_2_004215A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043F64018_2_0043F640
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044271018_2_00442710
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00447FB018_2_00447FB0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040104018_2_00401040
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044604018_2_00446040
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041A85518_2_0041A855
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044681018_2_00446810
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041002018_2_00410020
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043283018_2_00432830
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004328D018_2_004328D0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004298F018_2_004298F0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004388A018_2_004388A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004400A018_2_004400A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042F15618_2_0042F156
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043616218_2_00436162
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044617018_2_00446170
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044310018_2_00443100
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043290E18_2_0043290E
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044411518_2_00444115
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041391318_2_00413913
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043291D18_2_0043291D
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004089D018_2_004089D0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004349E018_2_004349E0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040A1A018_2_0040A1A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004201AB18_2_004201AB
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004381BB18_2_004381BB
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040CA4018_2_0040CA40
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043AA4018_2_0043AA40
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044725018_2_00447250
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00445A5218_2_00445A52
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042921018_2_00429210
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044623018_2_00446230
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00433ADD18_2_00433ADD
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042C2E018_2_0042C2E0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00446AE018_2_00446AE0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004462F018_2_004462F0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00440A8018_2_00440A80
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00402AB018_2_00402AB0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00421AB018_2_00421AB0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041535E18_2_0041535E
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040EB0018_2_0040EB00
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041CB1118_2_0041CB11
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043EB1018_2_0043EB10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043F32018_2_0043F320
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043C33818_2_0043C338
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004093C018_2_004093C0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004503DE18_2_004503DE
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004403E018_2_004403E0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004363F818_2_004363F8
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042638018_2_00426380
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043339618_2_00433396
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00429BA018_2_00429BA0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041FBB018_2_0041FBB0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042C3BD18_2_0042C3BD
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00438C4018_2_00438C40
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00424C6018_2_00424C60
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004034C018_2_004034C0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00437CC118_2_00437CC1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00407CF018_2_00407CF0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043ACF018_2_0043ACF0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042D48E18_2_0042D48E
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043D4B218_2_0043D4B2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00429D5018_2_00429D50
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043ED7018_2_0043ED70
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042CD1618_2_0042CD16
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00429D2E18_2_00429D2E
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00419D3C18_2_00419D3C
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043DD8B18_2_0043DD8B
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0040C5A018_2_0040C5A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004235B018_2_004235B0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00408E4018_2_00408E40
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041C65D18_2_0041C65D
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00403E6018_2_00403E60
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00415E7018_2_00415E70
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00435E0318_2_00435E03
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043160018_2_00431600
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041160518_2_00411605
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004336C218_2_004336C2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00431ED018_2_00431ED0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043C6D018_2_0043C6D0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00446EE018_2_00446EE0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00439EF418_2_00439EF4
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00425E8018_2_00425E80
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004206A018_2_004206A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041BF4318_2_0041BF43
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00427F6B18_2_00427F6B
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00420F0018_2_00420F00
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042BF1018_2_0042BF10
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00443F2218_2_00443F22
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0042B7C818_2_0042B7C8
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00418FD718_2_00418FD7
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_004127E018_2_004127E0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00411FF718_2_00411FF7
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0041B7A518_2_0041B7A5
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FC1AC018_2_03FC1AC0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FC115018_2_03FC1150
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FCD72918_2_03FCD729
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FBF67018_2_03FBF670
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB7E0018_2_03FB7E00
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\is-7UHOC.tmp\_isetup\_setup64.tmp 388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeProcess token adjusted: SecurityJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: String function: 00DA2A44 appears 47 times
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: String function: 00DA1E30 appears 104 times
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: String function: 00DA1DFC appears 37 times
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: String function: 00E450F0 appears 744 times
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: String function: 00418F30 appears 102 times
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: String function: 0040B190 appears 53 times
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1275847273.0000000002520000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Magic_V_pro_setup_stable_latest_release_version_9_709.exe
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000000.1271187599.00000000004B8000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFileName vs Magic_V_pro_setup_stable_latest_release_version_9_709.exe
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1358117029.0000000002388000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs Magic_V_pro_setup_stable_latest_release_version_9_709.exe
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000003.00000003.1276579889.000000007F2B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Magic_V_pro_setup_stable_latest_release_version_9_709.exe
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exe, 00000007.00000003.1704366229.0000000002298000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs Magic_V_pro_setup_stable_latest_release_version_9_709.exe
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeBinary or memory string: OriginalFileName vs Magic_V_pro_setup_stable_latest_release_version_9_709.exe
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: willrandom.exe.11.drStatic PE information: Section: pb ZLIB complexity 1.021484375
                  Source: classification engineClassification label: mal74.troj.spyw.evad.winEXE@63/26@50/9
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DB458B __EH_prolog,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_00DB458B
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA9749 _fileno,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,11_2_00DA9749
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA96A5 DeviceIoControl,GetDiskFreeSpaceExW,GetDiskFreeSpaceW,11_2_00DA96A5
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0043F640 CoCreateInstance,#2,CoSetProxyBlanket,#2,#2,#8,#9,#6,#6,#6,#6,GetVolumeInformationW,18_2_0043F640
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1780:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1460:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2812:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2112:120:WilError_03
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeFile created: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmpJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="systeminformer.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="idaq64.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="filemon.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="procmon.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="tcpview.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="processhacker.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="joeboxserver.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="cain.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="wsbroker.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="x32dbg.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="shade.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="xenservice.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="lordpe.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="proc_analyzer.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="bitbox.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="autoruns.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="apimonitor.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="regmon.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="ollydbg.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="x64dbg.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="hookexplorer.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="dumpcap.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="fiddler.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="windbg.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="ida.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="procexp.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="idaq.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="sysmon.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="httpanalyzerstdv7.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="wireshark.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="netstat.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="docker.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="httpdebuggerui.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="firejail.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="comodosandbox.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="sysanalyzer.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="cuckoo.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="immunitydebugger.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="joeboxcontrol.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="appguarddesktop.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="petools.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="importrec.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="autorunsc.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="sysinspector.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="netmon.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="sniff_hit.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="cheatengine-x86_64.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="frida-helper-64.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SeleCt * From wiN32_PrOCeSs WheRe nAme="gdb.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeString found in binary or memory: /LOADINF="filename"
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeFile read: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe "C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe"
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeProcess created: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp "C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$204BA,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe "C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeProcess created: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp "C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$304AE,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exe "C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exe" x "C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\logs" -o"C:\Users\user\AppData\Local\Programs\Common" -y -pCC3ba8B679c926fc9911aeDE9009E589CBD3667C48439c630418D27fDbb52Fc8
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe C:\Users\user\AppData\Local\programs\common\taskshostw.exe C:\Windows\system32\config\systemprofile\AppData\Local\programs\common\taskshostw.exe
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-GTB58.tmp.cmd""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1980,i,2116874388231828041,7596599948103174128,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2252 /prefetch:3
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1980,i,2116874388231828041,7596599948103174128,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5208 /prefetch:8
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeProcess created: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp "C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$204BA,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe "C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-Jump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeProcess created: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp "C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp" /SL5="$304AE,1192681,727040,C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exe "C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exe" x "C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\logs" -o"C:\Users\user\AppData\Local\Programs\Common" -y -pCC3ba8B679c926fc9911aeDE9009E589CBD3667C48439c630418D27fDbb52Fc8Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /fJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-GTB58.tmp.cmd""Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222Jump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1980,i,2116874388231828041,7596599948103174128,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2252 /prefetch:3Jump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=printing.mojom.UnsandboxedPrintBackendHost --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1980,i,2116874388231828041,7596599948103174128,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=5208 /prefetch:8Jump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: winhttpcom.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: mlang.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
                  Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}\InProcServer32Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWindow found: window name: TMainFormJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: certificate valid
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic file information: File size 3548416 > 1048576
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: wntdll.pdbUGP source: taskshostw.exe, 00000012.00000002.3150093681.0000000004030000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: taskshostw.exe, 00000012.00000002.3150093681.0000000004030000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: f:\mydev\inno-download-plugin\unicode\idp.pdb source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000003.1339202842.0000000003610000.00000004.00001000.00020000.00000000.sdmp, idp.dll.8.dr, idp.dll.6.dr
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E28180 GetCurrentProcessId,GetCurrentThreadId,LoadLibraryW,GetProcAddress,FreeLibrary,GetTickCount,QueryPerformanceCounter,GetTickCount,11_2_00E28180
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.exeStatic PE information: section name: .didata
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.3.drStatic PE information: section name: .didata
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp.7.drStatic PE information: section name: .didata
                  Source: idp.exe.8.drStatic PE information: section name: .sxdata
                  Source: willrandom.exe.11.drStatic PE information: section name: pb
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpCode function: 8_3_00933F91 push esi; ret 8_3_00933F93
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpCode function: 8_2_008A0370 push eax; ret 8_2_008A0371
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpCode function: 8_2_008A50B1 push esi; ret 8_2_008A50CB
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpCode function: 8_2_00933F91 push esi; ret 8_2_00933F93
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E450F0 push eax; ret 11_2_00E4510E
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E45470 push eax; ret 11_2_00E4549E
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044D1FA push ebp; iretd 18_2_0044D291
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044C9AE push edx; ret 18_2_0044C9AF
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00445EE0 push eax; mov dword ptr [esp], 2E29287Bh18_2_00445EE1
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044D6FC pushad ; iretd 18_2_0044D6FD
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044D700 push ebp; iretd 18_2_0044D701
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_0044D708 pushad ; iretd 18_2_0044D709
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB52DD push word ptr [esp]; mov dword ptr [esp], edx18_2_03FB58BF
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB1A83 push dword ptr [esp+40h]; retn 0044h18_2_03FB1A78
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB1A49 push dword ptr [esp+40h]; retn 0044h18_2_03FB1A78
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB3203 push ss; iretd 18_2_03FB320F
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB697A pushfd ; mov dword ptr [esp], eax18_2_03FB68C2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB3975 push word ptr [esp+01h]; mov dword ptr [esp], esp18_2_03FB3988
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB58C9 push word ptr [esp]; mov dword ptr [esp], edx18_2_03FB58BF
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB58C6 push word ptr [esp]; mov dword ptr [esp], edx18_2_03FB58BF
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB68BD pushfd ; mov dword ptr [esp], eax18_2_03FB68C2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB788D push ecx; ret 18_2_03FB78A0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB1038 push ebp; mov dword ptr [esp], edx18_2_03FB101C
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB6779 push word ptr [esp+01h]; mov dword ptr [esp], ebp18_2_03FB6728
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB15C5 push dword ptr [esp+04h]; retn 0008h18_2_03FB15D8
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB5D8C push dword ptr [esp+30h]; retn 0034h18_2_03FB5E2D
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB5D6C push dword ptr [esp+30h]; retn 0034h18_2_03FB5E2D
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB5D3F push dword ptr [esp+30h]; retn 0034h18_2_03FB5E2D
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB14B6 push dword ptr [esp+0Ch]; retn 0010h18_2_03FB14BA
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB145E push dword ptr [esp+0Ch]; retn 0010h18_2_03FB14BA
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB1C35 push dword ptr [esp+20h]; retn 0024h18_2_03FB1C27
                  Source: willrandom.exe.11.drStatic PE information: section name: CODE entropy: 7.216381671022325

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe"
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeFile created: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile created: C:\Users\user\AppData\Local\Temp\is-7UHOC.tmp\idp.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeFile created: C:\Users\user\AppData\Local\Programs\Common\willrandom.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile created: C:\Users\user\AppData\Local\Temp\is-7UHOC.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile created: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile created: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeFile created: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpFile created: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\_isetup\_setup64.tmpJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /xml C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\lang /tn WhatsAppSyncTaskMachineCore /f

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeFile deleted: c:\users\user\desktop\magic_v_pro_setup_stable_latest_release_version_9_709.exeJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="PETOOLS.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="SYSANALYZER.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="HOOKEXPLORER.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="PROC_ANALYZER.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="DUMPCAP.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="FIDDLER.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="PROCESSHACKER.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="SNIFF_HIT.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="FILEMON.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="WIRESHARK.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="OLLYDBG.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="X64DBG.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="IDAQ.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="WINDBG.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="AUTORUNS.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="XENSERVICE.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="IMPORTREC.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="PROCMON.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="REGMON.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y(SELECT * FROM WIN32_PROCESS WHERE NAME="OLLYDBG.EXE");
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WMI.EXECQUERY(SELECT * FROM WIN32_PROCESS WHERE NAME="AUTORUNSC.EXE");
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB69BB rdtsc 18_2_03FB69BB
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpCode function: 8_2_008A34C4 sldt word ptr [eax]8_2_008A34C4
                  Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 958Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-7UHOC.tmp\idp.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-7UHOC.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeAPI coverage: 6.4 %
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp TID: 1988Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe TID: 3492Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SEleCt * FrOm wIN32_CoMPuTeRsySteM
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA6CE2 __EH_prolog,FindFirstFileW,FindFirstFileW,FindFirstFileW,11_2_00DA6CE2
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB3F02 lstrcpyW,lstrcpyW,lstrcatW,FindFirstFileW,PathRemoveFileSpecW,lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,CreateDirectoryW,lstrcatW,lstrcatW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,lstrcatW,CopyFileExW,lstrcpyW,lstrcatW,lstrcpyW,lstrcatW,FindNextFileW,FindClose,18_2_03FB3F02
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DA7904 __EH_prolog,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW,11_2_00DA7904
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DAA0D3 GetSystemInfo,11_2_00DAA0D3
                  Source: taskshostw.exe, 00000012.00000003.2396086907.0000000000865000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000006.00000002.1353231883.0000000000912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.0000000000938000.00000004.00000020.00020000.00000000.sdmp, Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1399164930.0000000000922000.00000004.00000020.00020000.00000000.sdmp, taskshostw.exe, 00000012.00000003.2396086907.0000000000865000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, 00000008.00000003.1551506407.00000000008E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
                  Source: taskshostw.exe, 00000012.00000002.3145828858.0000000000830000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Local\Temp\is-E1ELN.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB69BB rdtsc 18_2_03FB69BB
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_00444660 LdrInitializeThunk,18_2_00444660
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E28180 GetCurrentProcessId,GetCurrentThreadId,LoadLibraryW,GetProcAddress,FreeLibrary,GetTickCount,QueryPerformanceCounter,GetTickCount,11_2_00E28180
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB2ADA mov edx, dword ptr fs:[00000030h]18_2_03FB2ADA
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB1227 mov edx, dword ptr fs:[00000030h]18_2_03FB1227
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB39C3 mov eax, dword ptr fs:[00000030h]18_2_03FB39C3
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB2720 mov ebx, dword ptr fs:[00000030h]18_2_03FB2720
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FB65CC mov edx, dword ptr fs:[00000030h]18_2_03FB65CC
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FC0D30 mov eax, dword ptr fs:[00000030h]18_2_03FC0D30
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeCode function: 18_2_03FC0D1D mov eax, dword ptr fs:[00000030h]18_2_03FC0D1D
                  Source: C:\Users\user\AppData\Local\Temp\is-TFCVM.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmpProcess created: C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe "C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe" /verysilent /sp-Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib +h +S "C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E458F0 cpuid 11_2_00E458F0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00DAAFFD GetSystemTimeAsFileTime,11_2_00DAAFFD
                  Source: C:\Users\user\AppData\Local\Temp\is-GTB58.tmp\idp.exeCode function: 11_2_00E428D0 GetVersion,GetModuleHandleW,GetProcAddress,11_2_00E428D0
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 18.3.taskshostw.exe.2990000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.2.taskshostw.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.3.taskshostw.exe.2990000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000003.1631758552.0000000002990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: taskshostw.exe, 00000012.00000002.3147101284.0000000000891000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                  Source: taskshostw.exe, 00000012.00000003.2396086907.000000000088F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                  Source: taskshostw.exe, 00000012.00000002.3147101284.0000000000891000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
                  Source: taskshostw.exe, 00000012.00000002.3145828858.00000000007FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                  Source: taskshostw.exe, 00000012.00000003.2396086907.000000000088F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                  Source: taskshostw.exe, 00000012.00000002.3147560636.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3d
                  Source: taskshostw.exe, 00000012.00000002.3147101284.00000000008A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binancel
                  Source: taskshostw.exe, 00000012.00000002.3147101284.000000000087F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                  Source: taskshostw.exe, 00000012.00000003.2396086907.000000000088F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                  Source: taskshostw.exe, 00000012.00000003.2396086907.00000000008C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: gbiamfdfmbikcdghidoadd","ez":"Byone"},{"en":"infeboajgfhgbjpjbeppbkgnabfdkdaf","ez":"OneKey"},{"en":"cihmoadaighcejopammfbmddcmdekcje","ez":"Leaf"},{"en":"bhhhlbepdkbapadjdnnojkbgioiodbic","ez":"Solflare"},{"en":"mkpegjkblkkefacfnmkajcjmabijhclg","ez":"Magic Eden"},{"en":"aflkmfhebedbjioipglgcbcmnbpgliof","ez":"Backpack"},{"en":"gaedmjdfmmahhbjefcbgaolhhanlaolb","ez":"Authy"},{"en":"oeljdldpnmdbchonielidgobddfffla","ez":"EOS Authenticator","ses":true},{"en":"ilgcnhelpchnceeipipijaljkblbcob","ez":"GAuth Authenticator","ses":true},{"en":"imloifkgjagghnncjkhggdhalmcnfklk","ez":"Trezor Password Manager"},{"en":"bfnaelmomeimhlpmgjnjophhpkkoljpa","ez":"Phantom"},{"en":"ppbibelpcjmhbdihakflkdcoccbgbkpo","ez":"UniSat"},{"en":"cpojfbodiccabbabgimdeohkkpjfpbnf","ez":"Rainbow"},{"en":"jiidiaalihmmhddjgbnbgdfflelocpak","ez":"Bitget Wallet"}],"mx":[{"en":"webextension@metamask.io","ez":"MetaMask","et":"\"params\":{\"iterations\":600000}"}],"c":[{"t":0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Ledger Live","m":["*"],"z":"Wallets/Ledger Live","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\atomic\\Local Storage\\leveldb","m":["*"],"z":"Wallets/Atomic","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Armory","m":["*.wallet"],"z":"Wallets/Armory","d":1,"fs":20971520},{"t":0,"p":"%localappdata%\\Coinomi\\Coinomi\\wallets","m":["*"],"z":"Wallets/Coinomi","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Authy Desktop\\Local Storage\\leveldb","m":["*"],"z":"Wallets/Authy Desktop","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Bitcoin\\wallets","m":["*"],"z":"Wallets/Bitcoin core","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Binance","m":["app-store.json",".finger-print.fp","simple-storage.json","window-state.json"],"z":"Wallets/Binance","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Version","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum\\wallets","m":["*"],"z":"Wallets/Electrum","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum-LTC\\wallets","m":["*"],"z":"Wallets/Electrum-LTC","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\ElectronCash\\wallets","m":["*"],"z":"Wallets/ElectronCash","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Guarda\\IndexedDB","m":["*"],"z":"Wallets/Guarda","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\DashCore\\wallets","m":["*.dat"],"z":"Wallets/DashCore","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\WalletWasabi\\Client\\Wallets","m":["*"],"z":"Wallets/Wasabi","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Daedalus Mainnet\\wallets","m":["she.*.sqlite"],"z":"Wallets/Daedalus","d":0,"fs":20971520},{"t":1,"p":"%localappdata%\\Google\\Chrome\\User Data","z":"Chrome","f":"Google Chrome","n":"chrome.exe","l":"chrome.dll"},{"t":1,"p":"%localappdata%\\Google\\Chrome Beta\\User Data","z":"Chrome Beta","f":"Google Chrome Beta","n":"chrome.exe","l":"chro
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: Yara matchFile source: 00000012.00000003.2396086907.000000000088F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: taskshostw.exe PID: 2444, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\AppData\Local\Programs\Common\taskshostw.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --remote-debugging-port=9222
                  Source: Yara matchFile source: 18.3.taskshostw.exe.2990000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.2.taskshostw.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 18.3.taskshostw.exe.2990000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000012.00000002.3144361654.0000000000400000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000003.1631758552.0000000002990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  4
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  DLL Search Order Hijacking
                  1
                  DLL Search Order Hijacking
                  4
                  Obfuscated Files or Information
                  LSASS Memory3
                  File and Directory Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts12
                  Command and Scripting Interpreter
                  1
                  Create Account
                  1
                  Access Token Manipulation
                  2
                  Software Packing
                  Security Account Manager47
                  System Information Discovery
                  SMB/Windows Admin Shares2
                  Clipboard Data
                  1
                  Remote Access Software
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  11
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS221
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture4
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                  Scheduled Task/Job
                  1
                  DLL Search Order Hijacking
                  LSA Secrets3
                  Virtualization/Sandbox Evasion
                  SSHKeylogging15
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  File Deletion
                  Cached Domain Credentials1
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job3
                  Virtualization/Sandbox Evasion
                  Proc Filesystem2
                  System Owner/User Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                  Process Injection
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632503 Sample: Magic_V_pro_setup_stable_la... Startdate: 08/03/2025 Architecture: WINDOWS Score: 74 82 willpowerwav.site 2->82 84 tinyurl.com 2->84 86 5 other IPs or domains 2->86 100 Suricata IDS alerts for network traffic 2->100 102 Found malware configuration 2->102 104 Antivirus detection for URL or domain 2->104 106 7 other signatures 2->106 11 Magic_V_pro_setup_stable_latest_release_version_9_709.exe 2 2->11         started        14 taskshostw.exe 2->14         started        signatures3 process4 dnsIp5 72 Magic_V_pro_setup_...e_version_9_709.tmp, PE32 11->72 dropped 18 Magic_V_pro_setup_stable_latest_release_version_9_709.tmp 3 12 11->18         started        96 willpowerwav.site 104.21.44.37, 443, 49707, 49708 CLOUDFLARENETUS United States 14->96 98 127.0.0.1 unknown unknown 14->98 116 Attempt to bypass Chrome Application-Bound Encryption 14->116 118 Found many strings related to Crypto-Wallets (likely being stolen) 14->118 120 Tries to steal Crypto Currency Wallets 14->120 22 chrome.exe 14->22         started        file6 signatures7 process8 dnsIp9 58 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 18->58 dropped 60 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->60 dropped 108 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->108 25 Magic_V_pro_setup_stable_latest_release_version_9_709.exe 2 18->25         started        88 192.168.2.5, 138, 443, 49662 unknown unknown 22->88 28 chrome.exe 22->28         started        31 chrome.exe 22->31         started        file10 signatures11 process12 dnsIp13 70 Magic_V_pro_setup_...e_version_9_709.tmp, PE32 25->70 dropped 33 Magic_V_pro_setup_stable_latest_release_version_9_709.tmp 3 21 25->33         started        90 play.google.com 142.250.185.78, 443, 49733, 49738 GOOGLEUS United States 28->90 92 www.google.com 142.250.186.36, 443, 49713, 49714 GOOGLEUS United States 28->92 94 6 other IPs or domains 28->94 file14 process15 dnsIp16 76 rentry.org 164.132.58.105, 443, 49700 OVHFR France 33->76 78 rea.grupolalegion.ec 190.92.154.206, 443, 49701, 49702 DesarrollosDigitalesdePulsarConsultingAR Argentina 33->78 80 tinyurl.com 104.17.112.233, 443, 49699 CLOUDFLARENETUS United States 33->80 62 C:\Users\user\AppData\Local\Temp\...\idp.exe, PE32 33->62 dropped 64 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 33->64 dropped 66 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 33->66 dropped 68 C:\Users\user\AppData\Local\Temp\...\lang, XML 33->68 dropped 110 Uses schtasks.exe or at.exe to add and modify task schedules 33->110 38 cmd.exe 1 33->38         started        41 cmd.exe 1 33->41         started        43 idp.exe 2 33->43         started        46 schtasks.exe 1 33->46         started        file17 signatures18 process19 file20 112 Uses attrib.exe to hide files 38->112 48 conhost.exe 38->48         started        50 attrib.exe 1 38->50         started        114 Deletes itself after installation 41->114 52 conhost.exe 41->52         started        74 C:\Users\user\AppData\...\willrandom.exe, PE32 43->74 dropped 54 conhost.exe 43->54         started        56 conhost.exe 46->56         started        signatures21 process22

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.