Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ysWQ4BqQrF.exe

Overview

General Information

Sample name:ysWQ4BqQrF.exe
renamed because original name is a hash value
Original sample name:ef4948765f8caae1f84b2199e785842e19e49c39630422c12a603c93d3e6b4b4.exe
Analysis ID:1634563
MD5:0be3c2adea2ab8c61cd2121e65e489ff
SHA1:161468a441925fe86e2a2d500d85f91d6eeb11e3
SHA256:ef4948765f8caae1f84b2199e785842e19e49c39630422c12a603c93d3e6b4b4
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: CMSTP Execution Process Creation
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a Windows Living Off The Land Binaries (LOL bins)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ysWQ4BqQrF.exe (PID: 6408 cmdline: "C:\Users\user\Desktop\ysWQ4BqQrF.exe" MD5: 0BE3C2ADEA2AB8C61CD2121E65E489FF)
    • powershell.exe (PID: 6748 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4560 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6840 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 2720 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • explorer.exe (PID: 496 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • cmstp.exe (PID: 6768 cmdline: "C:\Windows\SysWOW64\cmstp.exe" MD5: D7AABFAB5BEFD53BA3A27BD48F3CC675)
          • cmd.exe (PID: 7196 cmdline: /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cscript.exe (PID: 7180 cmdline: "C:\Windows\SysWOW64\cscript.exe" MD5: CB601B41D4C8074BE8A84AED564A94DC)
  • YNfDrfV.exe (PID: 372 cmdline: C:\Users\user\AppData\Roaming\YNfDrfV.exe MD5: 0BE3C2ADEA2AB8C61CD2121E65E489FF)
    • schtasks.exe (PID: 1580 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 2584 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 list": ["www.redgoodsgather.shop/egs9/"], "decoy": ["alliancecigars.net", "35893.pizza", "selidik.cloud", "evel789-aman.club", "wqsbr5jc.vip", "corretoraplanodesaude.shop", "balikoltada.xyz", "play-vanguard-nirvana.xyz", "paktuaslotxcxrtp.xyz", "retailzone1997.shop", "jk77juta-official.cloud", "godmoments.app", "flippinforbidsfrear.cloud", "234bets.net", "cryptobiz.tech", "construction-jobs-50157.bond", "cuficdarbiesdarleen.cloud", "t59bm675ri.skin", "ondqwxl.top", "kpde.xyz", "apoiador.xyz", "denotational.xyz", "fat-removal-40622.bond", "kqsamcsauqiagmma.xyz", "online-advertising-68283.bond", "mise96.xyz", "pokerdom55.vip", "arai.rest", "marketplace20.click", "kongou.systems", "isbnu.shop", "online-advertising-98154.bond", "pepsico.llc", "80072661.xyz", "wholesalemeat.today", "security-apps-16796.bond", "remationservices26114.shop", "kitchen-remodeling-14279.bond", "betterskin.store", "aigamestudio.xyz", "uhsrgi.info", "mentagekript.today", "box-spring-bed-50031.bond", "blood-flow.bond", "653emd.top", "venturelinks.net", "trendysolutions.store", "creativege.xyz", "sellhome.live", "petir99bro.xyz", "maipingxiu.net", "influencer-marketing-56510.bond", "czlovesys.xyz", "phpcrazy.net", "hikingk.store", "imstest.online", "bet2024.shop", "lord.land", "gobg.net", "armada77x.sbs", "msytuv.info", "buenosbufidinburez.cloud", "transeo.xyz", "deltaestates.online"]}
SourceRuleDescriptionAuthorStrings
00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cb90:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c8fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18819:$sqlite3step: 68 34 1C 7B E1
      • 0x1892c:$sqlite3step: 68 34 1C 7B E1
      • 0x18848:$sqlite3text: 68 38 2A 90 C5
      • 0x1896d:$sqlite3text: 68 38 2A 90 C5
      • 0x1885b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18983:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 38 entries
      SourceRuleDescriptionAuthorStrings
      6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          6.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1bd90:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x9bcf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x14ab7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          6.2.RegSvcs.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1aaf7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bafa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          6.2.RegSvcs.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17a19:$sqlite3step: 68 34 1C 7B E1
          • 0x17b2c:$sqlite3step: 68 34 1C 7B E1
          • 0x17a48:$sqlite3text: 68 38 2A 90 C5
          • 0x17b6d:$sqlite3text: 68 38 2A 90 C5
          • 0x17a5b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17b83:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries

          System Summary

          barindex
          Source: Process startedAuthor: Nik Seetharaman: Data: Command: /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe", CommandLine: /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\cmstp.exe", ParentImage: C:\Windows\SysWOW64\cmstp.exe, ParentProcessId: 6768, ParentProcessName: cmstp.exe, ProcessCommandLine: /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe", ProcessId: 7196, ProcessName: cmd.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ysWQ4BqQrF.exe", ParentImage: C:\Users\user\Desktop\ysWQ4BqQrF.exe, ParentProcessId: 6408, ParentProcessName: ysWQ4BqQrF.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", ProcessId: 6748, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ysWQ4BqQrF.exe", ParentImage: C:\Users\user\Desktop\ysWQ4BqQrF.exe, ParentProcessId: 6408, ParentProcessName: ysWQ4BqQrF.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", ProcessId: 6748, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\YNfDrfV.exe, ParentImage: C:\Users\user\AppData\Roaming\YNfDrfV.exe, ParentProcessId: 372, ParentProcessName: YNfDrfV.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp", ProcessId: 1580, ProcessName: schtasks.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\ysWQ4BqQrF.exe", ParentImage: C:\Users\user\Desktop\ysWQ4BqQrF.exe, ParentProcessId: 6408, ParentProcessName: ysWQ4BqQrF.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp", ProcessId: 6840, ProcessName: schtasks.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ysWQ4BqQrF.exe", ParentImage: C:\Users\user\Desktop\ysWQ4BqQrF.exe, ParentProcessId: 6408, ParentProcessName: ysWQ4BqQrF.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe", ProcessId: 6748, ProcessName: powershell.exe

          Persistence and Installation Behavior

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\ysWQ4BqQrF.exe", ParentImage: C:\Users\user\Desktop\ysWQ4BqQrF.exe, ParentProcessId: 6408, ParentProcessName: ysWQ4BqQrF.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp", ProcessId: 6840, ProcessName: schtasks.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-11T01:33:31.711551+010020314531Malware Command and Control Activity Detected192.168.2.64969415.197.225.12880TCP
          2025-03-11T01:34:15.956404+010020314531Malware Command and Control Activity Detected192.168.2.649692104.21.64.180TCP
          2025-03-11T01:35:17.778623+010020314531Malware Command and Control Activity Detected192.168.2.649695104.21.69.6180TCP
          2025-03-11T01:35:38.876414+010020314531Malware Command and Control Activity Detected192.168.2.64969692.112.189.4180TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ysWQ4BqQrF.exeAvira: detected
          Source: http://www.isbnu.shop/egs9/www.aigamestudio.xyzAvira URL Cloud: Label: malware
          Source: http://www.alliancecigars.net/egs9/www.flippinforbidsfrear.cloudAvira URL Cloud: Label: malware
          Source: http://www.evel789-aman.club/egs9/www.redgoodsgather.shopAvira URL Cloud: Label: malware
          Source: http://www.flippinforbidsfrear.cloud/egs9/www.kpde.xyzAvira URL Cloud: Label: malware
          Source: https://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZAvira URL Cloud: Label: malware
          Source: www.redgoodsgather.shop/egs9/Avira URL Cloud: Label: malware
          Source: http://www.flippinforbidsfrear.cloud/egs9/?K8elV=WY6dXz4hP2USskFVaG6AmVG36gfocnqcJNOT/iAq7eLnPv9oQtDKLFR9qtIXXXVluDfsS1HcVA==&mVfp=MTrLPvVhZLmAvira URL Cloud: Label: malware
          Source: http://www.evel789-aman.clubAvira URL Cloud: Label: malware
          Source: http://www.kongou.systemsAvira URL Cloud: Label: malware
          Source: http://www.imstest.onlineAvira URL Cloud: Label: malware
          Source: http://www.mentagekript.today/egs9/Avira URL Cloud: Label: malware
          Source: http://www.flippinforbidsfrear.cloud/egs9/Avira URL Cloud: Label: malware
          Source: http://www.redgoodsgather.shop/egs9/Avira URL Cloud: Label: malware
          Source: http://www.653emd.topAvira URL Cloud: Label: malware
          Source: http://www.redgoodsgather.shop/egs9/www.mentagekript.todayAvira URL Cloud: Label: malware
          Source: http://www.mentagekript.todayAvira URL Cloud: Label: malware
          Source: http://www.play-vanguard-nirvana.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDzbC4NqmTLwL8cGw==Avira URL Cloud: Label: malware
          Source: http://www.play-vanguard-nirvana.xyz/egs9/www.imstest.onlineAvira URL Cloud: Label: malware
          Source: http://www.alliancecigars.net/egs9/?mVfp=MTrLPvVhZLm&K8elV=wA+abWeWfQrMiE4bW8SGLQYY6mDtYGtq3v+j3Td9NN12kduRfWzJue6T+YpGJtlAkwGAydKR6g==Avira URL Cloud: Label: malware
          Source: http://www.kongou.systems/egs9/Avira URL Cloud: Label: malware
          Source: http://www.evel789-aman.club/egs9/Avira URL Cloud: Label: malware
          Source: http://www.alliancecigars.net/egs9/Avira URL Cloud: Label: malware
          Source: http://www.creativege.xyz/egs9/Avira URL Cloud: Label: malware
          Source: http://www.imstest.online/egs9/Avira URL Cloud: Label: malware
          Source: http://www.imstest.online/egs9/www.alliancecigars.netAvira URL Cloud: Label: malware
          Source: http://www.aigamestudio.xyzAvira URL Cloud: Label: malware
          Source: http://www.petir99bro.xyzAvira URL Cloud: Label: malware
          Source: http://www.aigamestudio.xyz/egs9/www.petir99bro.xyzAvira URL Cloud: Label: malware
          Source: http://www.kpde.xyz/egs9/Avira URL Cloud: Label: malware
          Source: http://www.petir99bro.xyz/egs9/www.kongou.systemsAvira URL Cloud: Label: malware
          Source: http://www.isbnu.shopAvira URL Cloud: Label: malware
          Source: http://www.petir99bro.xyz/egs9/Avira URL Cloud: Label: malware
          Source: http://www.kpde.xyz/egs9/www.t59bm675ri.skinAvira URL Cloud: Label: malware
          Source: http://www.alliancecigars.netAvira URL Cloud: Label: malware
          Source: http://www.653emd.top/egs9/Avira URL Cloud: Label: malware
          Source: http://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZM/DO1jiE4CQOHh/KO/hOdc1w==Avira URL Cloud: Label: malware
          Source: http://www.aigamestudio.xyz/egs9/Avira URL Cloud: Label: malware
          Source: http://www.isbnu.shop/egs9/Avira URL Cloud: Label: malware
          Source: http://www.t59bm675ri.skinAvira URL Cloud: Label: malware
          Source: http://www.creativege.xyz/egs9/www.hikingk.storeAvira URL Cloud: Label: malware
          Source: http://www.mentagekript.today/egs9/www.653emd.topAvira URL Cloud: Label: malware
          Source: http://www.kpde.xyzAvira URL Cloud: Label: malware
          Source: http://www.play-vanguard-nirvana.xyz/egs9/Avira URL Cloud: Label: malware
          Source: http://www.t59bm675ri.skin/egs9/www.evel789-aman.clubAvira URL Cloud: Label: malware
          Source: http://www.t59bm675ri.skin/egs9/Avira URL Cloud: Label: malware
          Source: http://www.redgoodsgather.shopAvira URL Cloud: Label: malware
          Source: http://www.flippinforbidsfrear.cloudAvira URL Cloud: Label: malware
          Source: http://www.653emd.top/egs9/www.creativege.xyzAvira URL Cloud: Label: malware
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeAvira: detection malicious, Label: TR/Kryptik.enuja
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.redgoodsgather.shop/egs9/"], "decoy": ["alliancecigars.net", "35893.pizza", "selidik.cloud", "evel789-aman.club", "wqsbr5jc.vip", "corretoraplanodesaude.shop", "balikoltada.xyz", "play-vanguard-nirvana.xyz", "paktuaslotxcxrtp.xyz", "retailzone1997.shop", "jk77juta-official.cloud", "godmoments.app", "flippinforbidsfrear.cloud", "234bets.net", "cryptobiz.tech", "construction-jobs-50157.bond", "cuficdarbiesdarleen.cloud", "t59bm675ri.skin", "ondqwxl.top", "kpde.xyz", "apoiador.xyz", "denotational.xyz", "fat-removal-40622.bond", "kqsamcsauqiagmma.xyz", "online-advertising-68283.bond", "mise96.xyz", "pokerdom55.vip", "arai.rest", "marketplace20.click", "kongou.systems", "isbnu.shop", "online-advertising-98154.bond", "pepsico.llc", "80072661.xyz", "wholesalemeat.today", "security-apps-16796.bond", "remationservices26114.shop", "kitchen-remodeling-14279.bond", "betterskin.store", "aigamestudio.xyz", "uhsrgi.info", "mentagekript.today", "box-spring-bed-50031.bond", "blood-flow.bond", "653emd.top", "venturelinks.net", "trendysolutions.store", "creativege.xyz", "sellhome.live", "petir99bro.xyz", "maipingxiu.net", "influencer-marketing-56510.bond", "czlovesys.xyz", "phpcrazy.net", "hikingk.store", "imstest.online", "bet2024.shop", "lord.land", "gobg.net", "armada77x.sbs", "msytuv.info", "buenosbufidinburez.cloud", "transeo.xyz", "deltaestates.online"]}
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeReversingLabs: Detection: 73%
          Source: ysWQ4BqQrF.exeReversingLabs: Detection: 73%
          Source: ysWQ4BqQrF.exeVirustotal: Detection: 75%Perma Link
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: ysWQ4BqQrF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: ysWQ4BqQrF.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: cscript.pdbUGP source: RegSvcs.exe, 00000011.00000002.1353568783.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.1356113989.0000000001AC0000.00000040.10000000.00040000.00000000.sdmp, cscript.exe, 00000013.00000002.1354212242.00000000001E0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: cmstp.pdbGCTL source: RegSvcs.exe, 00000006.00000002.1308989163.00000000013D0000.00000040.10000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.1308491441.0000000000F6D000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478344250.0000000000140000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: RegSvcs.pdb, source: explorer.exe, 00000007.00000002.2500429577.0000000010E8F000.00000004.80000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2481620369.0000000004BFF000.00000004.10000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478973491.000000000291B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: RegSvcs.exe, 00000006.00000002.1309235518.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1310681594.0000000004502000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.00000000046B0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1308646597.0000000004354000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.000000000484E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004A1E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1349529051.0000000004520000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1351827980.00000000046D9000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004880000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: RegSvcs.exe, RegSvcs.exe, 00000006.00000002.1309235518.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1310681594.0000000004502000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.00000000046B0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1308646597.0000000004354000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.000000000484E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004A1E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1349529051.0000000004520000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1351827980.00000000046D9000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004880000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: cmstp.pdb source: RegSvcs.exe, 00000006.00000002.1308989163.00000000013D0000.00000040.10000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.1308491441.0000000000F6D000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478344250.0000000000140000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: RegSvcs.pdb source: explorer.exe, 00000007.00000002.2500429577.0000000010E8F000.00000004.80000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2481620369.0000000004BFF000.00000004.10000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478973491.000000000291B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: cscript.pdb source: RegSvcs.exe, 00000011.00000002.1353568783.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.1356113989.0000000001AC0000.00000040.10000000.00040000.00000000.sdmp, cscript.exe, 00000013.00000002.1354212242.00000000001E0000.00000040.80000000.00040000.00000000.sdmp
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then pop esi6_2_004172FE

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49692 -> 104.21.64.1:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49692 -> 104.21.64.1:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49692 -> 104.21.64.1:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49695 -> 104.21.69.61:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49695 -> 104.21.69.61:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49695 -> 104.21.69.61:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49696 -> 92.112.189.41:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49696 -> 92.112.189.41:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49696 -> 92.112.189.41:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49694 -> 15.197.225.128:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49694 -> 15.197.225.128:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49694 -> 15.197.225.128:80
          Source: C:\Windows\explorer.exeNetwork Connect: 15.197.225.128 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.69.61 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.64.1 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 92.112.189.41 80Jump to behavior
          Source: Malware configuration extractorURLs: www.redgoodsgather.shop/egs9/
          Source: DNS query: www.play-vanguard-nirvana.xyz
          Source: DNS query: www.kpde.xyz
          Source: global trafficHTTP traffic detected: GET /egs9/?mVfp=MTrLPvVhZLm&K8elV=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDzbC4NqmTLwL8cGw== HTTP/1.1Host: www.play-vanguard-nirvana.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /egs9/?mVfp=MTrLPvVhZLm&K8elV=wA+abWeWfQrMiE4bW8SGLQYY6mDtYGtq3v+j3Td9NN12kduRfWzJue6T+YpGJtlAkwGAydKR6g== HTTP/1.1Host: www.alliancecigars.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /egs9/?K8elV=WY6dXz4hP2USskFVaG6AmVG36gfocnqcJNOT/iAq7eLnPv9oQtDKLFR9qtIXXXVluDfsS1HcVA==&mVfp=MTrLPvVhZLm HTTP/1.1Host: www.flippinforbidsfrear.cloudConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZM/DO1jiE4CQOHh/KO/hOdc1w== HTTP/1.1Host: www.kpde.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 15.197.225.128 15.197.225.128
          Source: Joe Sandbox ViewIP Address: 15.197.225.128 15.197.225.128
          Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
          Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
          Source: Joe Sandbox ViewASN Name: TANDEMUS TANDEMUS
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewASN Name: UKRTELNETUA UKRTELNETUA
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\explorer.exeCode function: 7_2_103F1F82 getaddrinfo,setsockopt,recv,7_2_103F1F82
          Source: global trafficHTTP traffic detected: GET /egs9/?mVfp=MTrLPvVhZLm&K8elV=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDzbC4NqmTLwL8cGw== HTTP/1.1Host: www.play-vanguard-nirvana.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /egs9/?mVfp=MTrLPvVhZLm&K8elV=wA+abWeWfQrMiE4bW8SGLQYY6mDtYGtq3v+j3Td9NN12kduRfWzJue6T+YpGJtlAkwGAydKR6g== HTTP/1.1Host: www.alliancecigars.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /egs9/?K8elV=WY6dXz4hP2USskFVaG6AmVG36gfocnqcJNOT/iAq7eLnPv9oQtDKLFR9qtIXXXVluDfsS1HcVA==&mVfp=MTrLPvVhZLm HTTP/1.1Host: www.flippinforbidsfrear.cloudConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZM/DO1jiE4CQOHh/KO/hOdc1w== HTTP/1.1Host: www.kpde.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.play-vanguard-nirvana.xyz
          Source: global trafficDNS traffic detected: DNS query: www.imstest.online
          Source: global trafficDNS traffic detected: DNS query: www.alliancecigars.net
          Source: global trafficDNS traffic detected: DNS query: www.flippinforbidsfrear.cloud
          Source: global trafficDNS traffic detected: DNS query: www.kpde.xyz
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: awselb/2.0Date: Tue, 11 Mar 2025 00:34:57 GMTContent-Length: 0Connection: closeWAFRule: 5
          Source: explorer.exe, 00000007.00000002.2492681158.000000000934A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.00000000071CB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1253596709.00000000071CB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.000000000934A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
          Source: explorer.exe, 00000007.00000002.2492681158.000000000934A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.00000000071CB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1253596709.00000000071CB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.000000000934A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000007.00000002.2483177153.0000000004415000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1252446139.0000000004415000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ns.adobeJH
          Source: explorer.exe, 00000007.00000002.2492681158.000000000934A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.00000000071CB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1253596709.00000000071CB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.000000000934A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000007.00000002.2492681158.000000000934A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.000000000934A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crl
          Source: explorer.exe, 00000007.00000000.1254434187.00000000077B0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000002.2490367876.00000000077A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1254368362.0000000007700000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C0D7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsof
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1267972369.0000000002401000.00000004.00000800.00020000.00000000.sdmp, YNfDrfV.exe, 00000008.00000002.1307720399.0000000002A4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.653emd.top
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.653emd.top/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.653emd.top/egs9/www.creativege.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.653emd.topReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aigamestudio.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aigamestudio.xyz/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aigamestudio.xyz/egs9/www.petir99bro.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aigamestudio.xyzReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.alliancecigars.net
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.alliancecigars.net/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.alliancecigars.net/egs9/www.flippinforbidsfrear.cloud
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.alliancecigars.netReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.creativege.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.creativege.xyz/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.creativege.xyz/egs9/www.hikingk.store
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.creativege.xyzReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.evel789-aman.club
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.evel789-aman.club/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.evel789-aman.club/egs9/www.redgoodsgather.shop
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.evel789-aman.clubReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.flippinforbidsfrear.cloud
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.flippinforbidsfrear.cloud/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.flippinforbidsfrear.cloud/egs9/www.kpde.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.flippinforbidsfrear.cloudReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hikingk.store
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hikingk.store/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hikingk.store/egs9/www.isbnu.shop
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hikingk.storeReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.imstest.online
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.imstest.online/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.imstest.online/egs9/www.alliancecigars.net
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.imstest.onlineReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.isbnu.shop
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.isbnu.shop/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.isbnu.shop/egs9/www.aigamestudio.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.isbnu.shopReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kongou.systems
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kongou.systems/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kongou.systemsReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kpde.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kpde.xyz/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kpde.xyz/egs9/www.t59bm675ri.skin
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kpde.xyzReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mentagekript.today
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mentagekript.today/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mentagekript.today/egs9/www.653emd.top
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mentagekript.todayReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.petir99bro.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.petir99bro.xyz/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.petir99bro.xyz/egs9/www.kongou.systems
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.petir99bro.xyzReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.play-vanguard-nirvana.xyz
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.play-vanguard-nirvana.xyz/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.play-vanguard-nirvana.xyz/egs9/www.imstest.online
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.play-vanguard-nirvana.xyzReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.redgoodsgather.shop
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.redgoodsgather.shop/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.redgoodsgather.shop/egs9/www.mentagekript.today
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.redgoodsgather.shopReferer:
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.t59bm675ri.skin
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.t59bm675ri.skin/egs9/
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.t59bm675ri.skin/egs9/www.evel789-aman.club
          Source: explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.t59bm675ri.skinReferer:
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE5D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE5D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppgr
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE5D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE5D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE5D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE5D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSV
          Source: explorer.exe, 00000007.00000000.1256858174.00000000092FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000007.00000002.2492681158.000000000934A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.000000000934A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000007.00000002.2492681158.00000000091E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.00000000091E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?3
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000007.00000002.2492681158.00000000091E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.00000000091E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
          Source: explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.comP;
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BD56000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BD56000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
          Source: explorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comZ
          Source: explorer.exe, 00000007.00000002.2500429577.000000001137F000.00000004.80000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2481620369.00000000050EF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZ
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
          Source: explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.2499237217.0000000010409000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
          Source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: ysWQ4BqQrF.exe PID: 6408, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: RegSvcs.exe PID: 2720, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: YNfDrfV.exe PID: 372, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: cmstp.exe PID: 6768, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: cscript.exe PID: 7180, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A330 NtCreateFile,6_2_0041A330
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A3E0 NtReadFile,6_2_0041A3E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A460 NtClose,6_2_0041A460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A510 NtAllocateVirtualMemory,6_2_0041A510
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A32A NtCreateFile,6_2_0041A32A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041A382 NtReadFile,6_2_0041A382
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512B60 NtClose,LdrInitializeThunk,6_2_01512B60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_01512BF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512AD0 NtReadFile,LdrInitializeThunk,6_2_01512AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512D10 NtMapViewOfSection,LdrInitializeThunk,6_2_01512D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_01512D30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512DD0 NtDelayExecution,LdrInitializeThunk,6_2_01512DD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_01512DF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_01512C70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_01512CA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512F30 NtCreateSection,LdrInitializeThunk,6_2_01512F30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512FE0 NtCreateFile,LdrInitializeThunk,6_2_01512FE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512F90 NtProtectVirtualMemory,LdrInitializeThunk,6_2_01512F90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512FB0 NtResumeThread,LdrInitializeThunk,6_2_01512FB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_01512E80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,6_2_01512EA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01514340 NtSetContextThread,6_2_01514340
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01514650 NtSuspendThread,6_2_01514650
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512BE0 NtQueryValueKey,6_2_01512BE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512B80 NtQueryInformationFile,6_2_01512B80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512BA0 NtEnumerateValueKey,6_2_01512BA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512AF0 NtWriteFile,6_2_01512AF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512AB0 NtWaitForSingleObject,6_2_01512AB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512D00 NtSetInformationFile,6_2_01512D00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512DB0 NtEnumerateKey,6_2_01512DB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512C60 NtCreateKey,6_2_01512C60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512C00 NtQueryInformationProcess,6_2_01512C00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512CC0 NtQueryVirtualMemory,6_2_01512CC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512CF0 NtOpenProcess,6_2_01512CF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512F60 NtCreateProcessEx,6_2_01512F60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512FA0 NtQuerySection,6_2_01512FA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512E30 NtWriteVirtualMemory,6_2_01512E30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512EE0 NtQueueApcThread,6_2_01512EE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01513010 NtOpenDirectoryObject,6_2_01513010
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01513090 NtSetValueKey,6_2_01513090
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015135C0 NtCreateMutant,6_2_015135C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015139B0 NtGetContextThread,6_2_015139B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01513D70 NtOpenThread,6_2_01513D70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01513D10 NtOpenProcessToken,6_2_01513D10
          Source: C:\Windows\explorer.exeCode function: 7_2_103F1232 NtCreateFile,7_2_103F1232
          Source: C:\Windows\explorer.exeCode function: 7_2_103F2E12 NtProtectVirtualMemory,7_2_103F2E12
          Source: C:\Windows\explorer.exeCode function: 7_2_103F2E0A NtProtectVirtualMemory,7_2_103F2E0A
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_00AFDDAC0_2_00AFDDAC
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_054178480_2_05417848
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_06E39EBE0_2_06E39EBE
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_06E319580_2_06E31958
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_06E374780_2_06E37478
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_06E33A830_2_06E33A83
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_06E3194F0_2_06E3194F
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_070566700_2_07056670
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_070566800_2_07056680
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_070581900_2_07058190
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_07056EE10_2_07056EE1
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_07056EF00_2_07056EF0
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_07058B900_2_07058B90
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_07056AB80_2_07056AB8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004010306_2_00401030
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004011746_2_00401174
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041DBC06_2_0041DBC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041E5666_2_0041E566
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00402D906_2_00402D90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00409E5B6_2_00409E5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00409E606_2_00409E60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041D7296_2_0041D729
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00402FB06_2_00402FB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015681586_2_01568158
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D01006_2_014D0100
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157A1186_2_0157A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015981CC6_2_015981CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A01AA6_2_015A01AA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015941A26_2_015941A2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015720006_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159A3526_2_0159A352
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A03E66_2_015A03E6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE3F06_2_014EE3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015802746_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015602C06_2_015602C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E05356_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A05916_2_015A0591
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015924466_2_01592446
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015844206_2_01584420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158E4F66_2_0158E4F6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015047506_2_01504750
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E07706_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DC7C06_2_014DC7C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FC6E06_2_014FC6E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F69626_2_014F6962
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015AA9A66_2_015AA9A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EA8406_2_014EA840
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E8F06_2_0150E8F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C68B86_2_014C68B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159AB406_2_0159AB40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01596BD76_2_01596BD7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA806_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157CD1F6_2_0157CD1F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EAD006_2_014EAD00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DADE06_2_014DADE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F8DBF6_2_014F8DBF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0C006_2_014E0C00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0CF26_2_014D0CF2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580CB56_2_01580CB5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01554F406_2_01554F40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01500F306_2_01500F30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01582F306_2_01582F30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01522F286_2_01522F28
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D2FC86_2_014D2FC8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014ECFE06_2_014ECFE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155EFA06_2_0155EFA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0E596_2_014E0E59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159EE266_2_0159EE26
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159EEDB6_2_0159EEDB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159CE936_2_0159CE93
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2E906_2_014F2E90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015AB16B6_2_015AB16B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0151516C6_2_0151516C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CF1726_2_014CF172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EB1B06_2_014EB1B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158F0CC6_2_0158F0CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015970E96_2_015970E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159F0E06_2_0159F0E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CD34C6_2_014CD34C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159132D6_2_0159132D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0152739A6_2_0152739A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FB2C06_2_014FB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015812ED6_2_015812ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E52A06_2_014E52A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015975716_2_01597571
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157D5B06_2_0157D5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D14606_2_014D1460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159F43F6_2_0159F43F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159F7B06_2_0159F7B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015916CC6_2_015916CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E99506_2_014E9950
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FB9506_2_014FB950
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015759106_2_01575910
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154D8006_2_0154D800
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E38E06_2_014E38E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159FB766_2_0159FB76
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01555BF06_2_01555BF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0151DBF96_2_0151DBF9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FFB806_2_014FFB80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159FA496_2_0159FA49
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01597A466_2_01597A46
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01553A6C6_2_01553A6C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158DAC66_2_0158DAC6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01525AA06_2_01525AA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01581AA36_2_01581AA3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01591D5A6_2_01591D5A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E3D406_2_014E3D40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01597D736_2_01597D73
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FFDC06_2_014FFDC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01559C326_2_01559C32
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159FCF26_2_0159FCF2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159FF096_2_0159FF09
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014A3FD26_2_014A3FD2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014A3FD56_2_014A3FD5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E1F926_2_014E1F92
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159FFB16_2_0159FFB1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E9EB06_2_014E9EB0
          Source: C:\Windows\explorer.exeCode function: 7_2_103F12327_2_103F1232
          Source: C:\Windows\explorer.exeCode function: 7_2_103F00367_2_103F0036
          Source: C:\Windows\explorer.exeCode function: 7_2_103E70827_2_103E7082
          Source: C:\Windows\explorer.exeCode function: 7_2_103EBB327_2_103EBB32
          Source: C:\Windows\explorer.exeCode function: 7_2_103EBB307_2_103EBB30
          Source: C:\Windows\explorer.exeCode function: 7_2_103EE9127_2_103EE912
          Source: C:\Windows\explorer.exeCode function: 7_2_103E8D027_2_103E8D02
          Source: C:\Windows\explorer.exeCode function: 7_2_103F45CD7_2_103F45CD
          Source: C:\Windows\explorer.exeCode function: 7_2_108D80827_2_108D8082
          Source: C:\Windows\explorer.exeCode function: 7_2_108E10367_2_108E1036
          Source: C:\Windows\explorer.exeCode function: 7_2_108E55CD7_2_108E55CD
          Source: C:\Windows\explorer.exeCode function: 7_2_108D9D027_2_108D9D02
          Source: C:\Windows\explorer.exeCode function: 7_2_108DF9127_2_108DF912
          Source: C:\Windows\explorer.exeCode function: 7_2_108E22327_2_108E2232
          Source: C:\Windows\explorer.exeCode function: 7_2_108DCB307_2_108DCB30
          Source: C:\Windows\explorer.exeCode function: 7_2_108DCB327_2_108DCB32
          Source: C:\Windows\explorer.exeCode function: 7_2_10A290827_2_10A29082
          Source: C:\Windows\explorer.exeCode function: 7_2_10A320367_2_10A32036
          Source: C:\Windows\explorer.exeCode function: 7_2_10A365CD7_2_10A365CD
          Source: C:\Windows\explorer.exeCode function: 7_2_10A2AD027_2_10A2AD02
          Source: C:\Windows\explorer.exeCode function: 7_2_10A309127_2_10A30912
          Source: C:\Windows\explorer.exeCode function: 7_2_10A332327_2_10A33232
          Source: C:\Windows\explorer.exeCode function: 7_2_10A2DB327_2_10A2DB32
          Source: C:\Windows\explorer.exeCode function: 7_2_10A2DB307_2_10A2DB30
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_0106DDAC8_2_0106DDAC
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_050270188_2_05027018
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_05021FF08_2_05021FF0
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_050200068_2_05020006
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_050200408_2_05020040
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_0502D7318_2_0502D731
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_0502D7408_2_0502D740
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_050270088_2_05027008
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_06D513988_2_06D51398
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_06D535218_2_06D53521
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_06D5138F8_2_06D5138F
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_06D56F188_2_06D56F18
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_070F66D98_2_070F66D9
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_070F66E88_2_070F66E8
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_070F83888_2_070F8388
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_070F62B08_2_070F62B0
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_070F5E788_2_070F5E78
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_070F79888_2_070F7988
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 01515130 appears 58 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0155F290 appears 105 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 014CB970 appears 250 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0154EA12 appears 86 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 01527E54 appears 101 times
          Source: ysWQ4BqQrF.exe, 00000000.00000000.1227725486.0000000000022000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameeTkJ.exe4 vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1275967589.00000000071A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1267972369.00000000024DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1274677748.0000000006CE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1265937596.00000000005EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exeBinary or memory string: OriginalFilenameeTkJ.exe4 vs ysWQ4BqQrF.exe
          Source: ysWQ4BqQrF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"Jump to behavior
          Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.2499237217.0000000010409000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
          Source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: ysWQ4BqQrF.exe PID: 6408, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: RegSvcs.exe PID: 2720, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: YNfDrfV.exe PID: 372, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: cmstp.exe PID: 6768, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: cscript.exe PID: 7180, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: ysWQ4BqQrF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: YNfDrfV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, JZnwkkYXCXji1Q8Kx0.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, JZnwkkYXCXji1Q8Kx0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, JZnwkkYXCXji1Q8Kx0.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, JZnwkkYXCXji1Q8Kx0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, q6F2oxcomMvFsKZ5RC.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, JZnwkkYXCXji1Q8Kx0.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, JZnwkkYXCXji1Q8Kx0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.troj.evad.winEXE@163/11@5/4
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeFile created: C:\Users\user\AppData\Roaming\YNfDrfV.exeJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6896:120:WilError_03
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7204:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6764:120:WilError_03
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMutant created: \Sessions\1\BaseNamedObjects\GUGzbA
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeFile created: C:\Users\user\AppData\Local\Temp\tmp299E.tmpJump to behavior
          Source: ysWQ4BqQrF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: ysWQ4BqQrF.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: ysWQ4BqQrF.exeReversingLabs: Detection: 73%
          Source: ysWQ4BqQrF.exeVirustotal: Detection: 75%
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeFile read: C:\Users\user\Desktop\ysWQ4BqQrF.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\ysWQ4BqQrF.exe "C:\Users\user\Desktop\ysWQ4BqQrF.exe"
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp"
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\YNfDrfV.exe C:\Users\user\AppData\Roaming\YNfDrfV.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe"
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp"Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: iconcodecservice.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: wscinterop.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: wscapi.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: werconcpl.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: wer.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: hcproviders.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: iconcodecservice.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: cmutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: ysWQ4BqQrF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: ysWQ4BqQrF.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: ysWQ4BqQrF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: cscript.pdbUGP source: RegSvcs.exe, 00000011.00000002.1353568783.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.1356113989.0000000001AC0000.00000040.10000000.00040000.00000000.sdmp, cscript.exe, 00000013.00000002.1354212242.00000000001E0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: cmstp.pdbGCTL source: RegSvcs.exe, 00000006.00000002.1308989163.00000000013D0000.00000040.10000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.1308491441.0000000000F6D000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478344250.0000000000140000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: RegSvcs.pdb, source: explorer.exe, 00000007.00000002.2500429577.0000000010E8F000.00000004.80000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2481620369.0000000004BFF000.00000004.10000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478973491.000000000291B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: RegSvcs.exe, 00000006.00000002.1309235518.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1310681594.0000000004502000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.00000000046B0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1308646597.0000000004354000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.000000000484E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004A1E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1349529051.0000000004520000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1351827980.00000000046D9000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004880000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: RegSvcs.exe, RegSvcs.exe, 00000006.00000002.1309235518.00000000014A0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1310681594.0000000004502000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.00000000046B0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 00000010.00000003.1308646597.0000000004354000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2480535520.000000000484E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004A1E000.00000040.00001000.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1349529051.0000000004520000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000003.1351827980.00000000046D9000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000013.00000002.1355033981.0000000004880000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: cmstp.pdb source: RegSvcs.exe, 00000006.00000002.1308989163.00000000013D0000.00000040.10000000.00040000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.1308491441.0000000000F6D000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478344250.0000000000140000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: RegSvcs.pdb source: explorer.exe, 00000007.00000002.2500429577.0000000010E8F000.00000004.80000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2481620369.0000000004BFF000.00000004.10000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2478973491.000000000291B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: cscript.pdb source: RegSvcs.exe, 00000011.00000002.1353568783.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.1356113989.0000000001AC0000.00000040.10000000.00040000.00000000.sdmp, cscript.exe, 00000013.00000002.1354212242.00000000001E0000.00000040.80000000.00040000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: ysWQ4BqQrF.exe, BackgroundForms.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
          Source: YNfDrfV.exe.0.dr, BackgroundForms.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, q6F2oxcomMvFsKZ5RC.cs.Net Code: aaU2wdb9OfolGKY5gGv System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ysWQ4BqQrF.exe.25ae1c0.0.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ysWQ4BqQrF.exe.6ce0000.3.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, q6F2oxcomMvFsKZ5RC.cs.Net Code: aaU2wdb9OfolGKY5gGv System.Reflection.Assembly.Load(byte[])
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, q6F2oxcomMvFsKZ5RC.cs.Net Code: aaU2wdb9OfolGKY5gGv System.Reflection.Assembly.Load(byte[])
          Source: 8.2.YNfDrfV.exe.2bae160.0.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: ysWQ4BqQrF.exeStatic PE information: 0xB221FC66 [Sat Sep 13 22:49:10 2064 UTC]
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_05419558 push eax; iretd 0_2_05419559
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_06E306B0 pushfd ; ret 0_2_06E306BD
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_0705A510 push esp; iretd 0_2_0705A511
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_0705F525 push FFFFFF8Bh; iretd 0_2_0705F527
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_07057431 push esp; iretd 0_2_0705743D
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeCode function: 0_2_07059DE8 push FFFFFFE9h; retf 0_2_07059DB1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00407820 push edx; ret 6_2_0040783D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041F0B9 push eax; ret 6_2_0041F0C8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0040E3FA push cs; retf 6_2_0040E413
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041D4D2 push eax; ret 6_2_0041D4D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041D4DB push eax; ret 6_2_0041D542
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041D485 push eax; ret 6_2_0041D4D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0041D53C push eax; ret 6_2_0041D542
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_004077EA push edx; ret 6_2_0040783D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00408793 push edx; ret 6_2_0040879A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014A225F pushad ; ret 6_2_014A27F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014A27FA pushad ; ret 6_2_014A27F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D09AD push ecx; mov dword ptr [esp], ecx6_2_014D09B6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014A283D push eax; iretd 6_2_014A2858
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014A135E push eax; iretd 6_2_014A1369
          Source: C:\Windows\explorer.exeCode function: 7_2_103F4B1E push esp; retn 0000h7_2_103F4B1F
          Source: C:\Windows\explorer.exeCode function: 7_2_103F4B02 push esp; retn 0000h7_2_103F4B03
          Source: C:\Windows\explorer.exeCode function: 7_2_103F49B5 push esp; retn 0000h7_2_103F4AE7
          Source: C:\Windows\explorer.exeCode function: 7_2_108E59B5 push esp; retn 0000h7_2_108E5AE7
          Source: C:\Windows\explorer.exeCode function: 7_2_108E5B02 push esp; retn 0000h7_2_108E5B03
          Source: C:\Windows\explorer.exeCode function: 7_2_108E5B1E push esp; retn 0000h7_2_108E5B1F
          Source: C:\Windows\explorer.exeCode function: 7_2_10A369B5 push esp; retn 0000h7_2_10A36AE7
          Source: C:\Windows\explorer.exeCode function: 7_2_10A36B02 push esp; retn 0000h7_2_10A36B03
          Source: C:\Windows\explorer.exeCode function: 7_2_10A36B1E push esp; retn 0000h7_2_10A36B1F
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_05026D88 pushad ; ret 8_2_05026D96
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeCode function: 8_2_06D50138 pushfd ; ret 8_2_06D50145
          Source: ysWQ4BqQrF.exeStatic PE information: section name: .text entropy: 7.751641969269613
          Source: YNfDrfV.exe.0.drStatic PE information: section name: .text entropy: 7.751641969269613
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, yYN3LZeGxkWglkjOZx.csHigh entropy of concatenated method names: 'QCQosIK7dd', 'hxlojreWXu', 'oKwowqhptK', 'PJYwrWR50H', 'WcYwzKeg06', 'sseoK70AEn', 'YQ9oMtDoXS', 'WVHoYtmZwl', 'VkvotC6hVg', 'IKRo0XGgmA'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, yr2deFq2f931OIfXoy.csHigh entropy of concatenated method names: 'UsebnvGtMq', 'uPubquO3Tg', 'SEpbmiscCU', 'l2LbWVwqBO', 'rM0bhvZE6J', 'hHBbT4hicr', 'Cl5bFxAeOJ', 'I39b4dAsDR', 'fXsbgPLZqb', 'DlZbvkcbiL'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, lpYAmXddBhtVd0vRZnW.csHigh entropy of concatenated method names: 'gsPprJAfXU', 'sRHpzLpsvv', 'b5JcKOMbPt', 'FjxcM2VelB', 'Bd6cY8pGwL', 'H9bctQj1VZ', 'av1c0CFJT5', 'Y9yc8aZeIJ', 'Gqacsl4KiU', 'F7vcItfn7x'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, JZnwkkYXCXji1Q8Kx0.csHigh entropy of concatenated method names: 'PwIIGNo3HJ', 'vvnI6o7cX3', 'OxCICBV0vB', 'ioxIAxh60l', 'xxGIHmEkUA', 'aksI1jD2CZ', 'asuIOZIOOY', 'ChmIVdgsML', 'RSIIif1B7a', 'mikIre9tVQ'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, kOuhoQrCmYX29rWygG.csHigh entropy of concatenated method names: 'rjPoex1JG2', 'OkGoPxEyCt', 'AqnoRU2RSS', 'RBHoBh6QiZ', 'pimo2RPVHA', 'vPxoa3cxaU', 'YpdodGKRy7', 'C7WonILtEK', 'qGqoqNCD49', 'sJwoy1PTQp'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, BOcxrtd5nSAGqrHLIuD.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fSVl7UtI97', 'L6YlpjYTmg', 'FIBlcNDKCr', 'UIvllR6uUZ', 'Kytl57AvyF', 'zeulu6ryRO', 'qE1lUNrGjB'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, BZQRJSjfxbAZaRWQR2.csHigh entropy of concatenated method names: 'ToString', 'I66Dv25Co9', 'KdgDWwTwyD', 'FoODJC8uTK', 'l46Dh7mKlG', 'moUDT8Asft', 's96DZ14OGT', 'fwuDFAyvgk', 'nkAD4QUIK8', 'NOODQ5KPn9'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, X42qarbak4yLRxGZZc.csHigh entropy of concatenated method names: 'Sllpju0PMG', 'gUFpLbFAdH', 'cDbpwA2cWQ', 'TOBpoKERIF', 'K2hp78XjJR', 'DqTpfoO0Rb', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, Rhbe9ek7JLU3oueh1L.csHigh entropy of concatenated method names: 'Dispose', 'JD1MibJmkP', 'WASYWpahHh', 'z4PlHLvf78', 'LdEMrNEFu3', 'tXWMzrcqup', 'ProcessDialogKey', 'j62YKk8yug', 'GBYYMt2etl', 'tq3YYPOVSB'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, QdMqp2hcRk37SFZxxe.csHigh entropy of concatenated method names: 'fS6NVNh5hI', 'nD8NrLBYBW', 'F6aSKqC3Nn', 'QsoSMY5vTn', 'MKBNvToB6s', 'BeoNEFc1BL', 'CwpN3F5Rhd', 'PMdNGP7oXC', 'vQlN6fJlof', 'cuaNCOfVuW'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, PR6Q88nJZ4tlIMTCQy.csHigh entropy of concatenated method names: 'TVdjBd1Ivb', 'tQ8ja88gRN', 'irwjnd7TfY', 'fjMjqhfPAE', 'wV5jX1WvpD', 'vuJjDoW8i7', 'qh6jN1w7Pi', 'HfvjSHnPo5', 'nkFj7fAZOG', 'R13jpsenmX'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, a4hSlqAP8NWEPYInyj.csHigh entropy of concatenated method names: 'wdm7mrLMQv', 'xQ17W2ISID', 'D2c7JR2e9F', 'gEN7hOyoVG', 'OpD7TwtBCi', 'hod7Z0WPpB', 'LHD7Fpt1E0', 'tv674npVjM', 'MT07QIB8VB', 'sc27gWyy1h'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, q6F2oxcomMvFsKZ5RC.csHigh entropy of concatenated method names: 'ew3t8xTUkS', 'nk8tsBv7Fd', 'U0qtIuSSPi', 'XmKtj9lOpX', 'ApctLH791v', 'NoRtwcRiYV', 'D3HtoaMooP', 'uqLtfNZupx', 'hrFt94xCqq', 'jkhtxe5Gm5'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, Vr5Id254pA7jDaWFEY.csHigh entropy of concatenated method names: 'XOaMo3USG9', 'niXMfUYFru', 'TGeMx0NkFw', 'Hn7MkKJuuI', 'LtfMX93Xu8', 'DLFMDLVHu2', 'WIdrMjD7n4LQFYa3ax', 'HTxCDTlrl2ifpmG6qF', 'O5uCQdZYEJhWCvH24F', 'AFfMMsYls9'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, BYXBa7J1Id9cWWmeie.csHigh entropy of concatenated method names: 'jaFw8TjaHq', 'ecMwI4DfCv', 'FRiwL3Fra3', 'hB6wox2IM4', 'CjnwfflVUt', 'PFOLH8UJJ2', 'Su6L1jFX4Z', 'KGJLOUA18H', 'uNmLVdpNjV', 'nSKLijiXp1'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, f4S276znUWDxrspgbt.csHigh entropy of concatenated method names: 'K36paM3T2m', 'HjLpnuXqK1', 'W78pq1b8Vk', 'kTopmIJFqM', 'p2dpW2AakM', 'NwrphIgryh', 'dyXpTi8deq', 'OCepUGYTP3', 'iU9pebFT9C', 'OKjpP3EKVg'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, zpZj8Iwb1BQtEkf8I7.csHigh entropy of concatenated method names: 'bCKRfK9O2', 'a3YBUBfjv', 'bcEa4uDEQ', 'SKrd9PCae', 'PjMq3gda6', 'OaByBa3S9', 'q7MaOGsf7aLGYdlBDW', 'L4a4I3orFFcs3e4QVC', 'w4USVtspk', 'IMTpKTBB0'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, HUvQLPRDSnswoPbcPM.csHigh entropy of concatenated method names: 'v4jL28BIfS', 'ig5LdUhHjS', 'LvejJ8By4L', 'vU5jhvXk72', 'tNQjTHtYlD', 't6YjZwKnxy', 'eiOjFv3lrH', 'eorj4ad9HP', 'nPVjQfvOC1', 'ilCjg2ueaS'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, Bo0FOBdilP7qFKYcZAQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SYCpv4Xec4', 'TBFpEllCJO', 'fsXp3P9wwq', 'ailpGMFkkF', 'WQJp6NK6su', 'n9NpCYMRdq', 'bK2pAf2XdD'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, WpvUyIMbFNBNBEewoY.csHigh entropy of concatenated method names: 'yIDNxVOGmA', 'qvVNkR2138', 'ToString', 'MIANskDaqU', 'CHUNIrj4mb', 'WZkNjTQPct', 'mrgNLNE6E0', 'sCENw7WL3R', 'hTONoq3gXu', 'M4CNfToVeq'
          Source: 0.2.ysWQ4BqQrF.exe.368e638.2.raw.unpack, WLPOoi3IpRU3GTScqI.csHigh entropy of concatenated method names: 'kS67XGsOA1', 'zeU7NRy9lL', 'hRb778AiSQ', 'DXF7cKhc18', 'SEx75vfRiJ', 'WdJ7Ub7OtF', 'Dispose', 'xhUSsxU0VD', 'vFxSIemGCd', 'snhSjs7mOB'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, yYN3LZeGxkWglkjOZx.csHigh entropy of concatenated method names: 'QCQosIK7dd', 'hxlojreWXu', 'oKwowqhptK', 'PJYwrWR50H', 'WcYwzKeg06', 'sseoK70AEn', 'YQ9oMtDoXS', 'WVHoYtmZwl', 'VkvotC6hVg', 'IKRo0XGgmA'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, yr2deFq2f931OIfXoy.csHigh entropy of concatenated method names: 'UsebnvGtMq', 'uPubquO3Tg', 'SEpbmiscCU', 'l2LbWVwqBO', 'rM0bhvZE6J', 'hHBbT4hicr', 'Cl5bFxAeOJ', 'I39b4dAsDR', 'fXsbgPLZqb', 'DlZbvkcbiL'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, lpYAmXddBhtVd0vRZnW.csHigh entropy of concatenated method names: 'gsPprJAfXU', 'sRHpzLpsvv', 'b5JcKOMbPt', 'FjxcM2VelB', 'Bd6cY8pGwL', 'H9bctQj1VZ', 'av1c0CFJT5', 'Y9yc8aZeIJ', 'Gqacsl4KiU', 'F7vcItfn7x'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, JZnwkkYXCXji1Q8Kx0.csHigh entropy of concatenated method names: 'PwIIGNo3HJ', 'vvnI6o7cX3', 'OxCICBV0vB', 'ioxIAxh60l', 'xxGIHmEkUA', 'aksI1jD2CZ', 'asuIOZIOOY', 'ChmIVdgsML', 'RSIIif1B7a', 'mikIre9tVQ'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, kOuhoQrCmYX29rWygG.csHigh entropy of concatenated method names: 'rjPoex1JG2', 'OkGoPxEyCt', 'AqnoRU2RSS', 'RBHoBh6QiZ', 'pimo2RPVHA', 'vPxoa3cxaU', 'YpdodGKRy7', 'C7WonILtEK', 'qGqoqNCD49', 'sJwoy1PTQp'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, BOcxrtd5nSAGqrHLIuD.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fSVl7UtI97', 'L6YlpjYTmg', 'FIBlcNDKCr', 'UIvllR6uUZ', 'Kytl57AvyF', 'zeulu6ryRO', 'qE1lUNrGjB'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, BZQRJSjfxbAZaRWQR2.csHigh entropy of concatenated method names: 'ToString', 'I66Dv25Co9', 'KdgDWwTwyD', 'FoODJC8uTK', 'l46Dh7mKlG', 'moUDT8Asft', 's96DZ14OGT', 'fwuDFAyvgk', 'nkAD4QUIK8', 'NOODQ5KPn9'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, X42qarbak4yLRxGZZc.csHigh entropy of concatenated method names: 'Sllpju0PMG', 'gUFpLbFAdH', 'cDbpwA2cWQ', 'TOBpoKERIF', 'K2hp78XjJR', 'DqTpfoO0Rb', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, Rhbe9ek7JLU3oueh1L.csHigh entropy of concatenated method names: 'Dispose', 'JD1MibJmkP', 'WASYWpahHh', 'z4PlHLvf78', 'LdEMrNEFu3', 'tXWMzrcqup', 'ProcessDialogKey', 'j62YKk8yug', 'GBYYMt2etl', 'tq3YYPOVSB'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, QdMqp2hcRk37SFZxxe.csHigh entropy of concatenated method names: 'fS6NVNh5hI', 'nD8NrLBYBW', 'F6aSKqC3Nn', 'QsoSMY5vTn', 'MKBNvToB6s', 'BeoNEFc1BL', 'CwpN3F5Rhd', 'PMdNGP7oXC', 'vQlN6fJlof', 'cuaNCOfVuW'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, PR6Q88nJZ4tlIMTCQy.csHigh entropy of concatenated method names: 'TVdjBd1Ivb', 'tQ8ja88gRN', 'irwjnd7TfY', 'fjMjqhfPAE', 'wV5jX1WvpD', 'vuJjDoW8i7', 'qh6jN1w7Pi', 'HfvjSHnPo5', 'nkFj7fAZOG', 'R13jpsenmX'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, a4hSlqAP8NWEPYInyj.csHigh entropy of concatenated method names: 'wdm7mrLMQv', 'xQ17W2ISID', 'D2c7JR2e9F', 'gEN7hOyoVG', 'OpD7TwtBCi', 'hod7Z0WPpB', 'LHD7Fpt1E0', 'tv674npVjM', 'MT07QIB8VB', 'sc27gWyy1h'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, q6F2oxcomMvFsKZ5RC.csHigh entropy of concatenated method names: 'ew3t8xTUkS', 'nk8tsBv7Fd', 'U0qtIuSSPi', 'XmKtj9lOpX', 'ApctLH791v', 'NoRtwcRiYV', 'D3HtoaMooP', 'uqLtfNZupx', 'hrFt94xCqq', 'jkhtxe5Gm5'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, Vr5Id254pA7jDaWFEY.csHigh entropy of concatenated method names: 'XOaMo3USG9', 'niXMfUYFru', 'TGeMx0NkFw', 'Hn7MkKJuuI', 'LtfMX93Xu8', 'DLFMDLVHu2', 'WIdrMjD7n4LQFYa3ax', 'HTxCDTlrl2ifpmG6qF', 'O5uCQdZYEJhWCvH24F', 'AFfMMsYls9'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, BYXBa7J1Id9cWWmeie.csHigh entropy of concatenated method names: 'jaFw8TjaHq', 'ecMwI4DfCv', 'FRiwL3Fra3', 'hB6wox2IM4', 'CjnwfflVUt', 'PFOLH8UJJ2', 'Su6L1jFX4Z', 'KGJLOUA18H', 'uNmLVdpNjV', 'nSKLijiXp1'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, f4S276znUWDxrspgbt.csHigh entropy of concatenated method names: 'K36paM3T2m', 'HjLpnuXqK1', 'W78pq1b8Vk', 'kTopmIJFqM', 'p2dpW2AakM', 'NwrphIgryh', 'dyXpTi8deq', 'OCepUGYTP3', 'iU9pebFT9C', 'OKjpP3EKVg'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, zpZj8Iwb1BQtEkf8I7.csHigh entropy of concatenated method names: 'bCKRfK9O2', 'a3YBUBfjv', 'bcEa4uDEQ', 'SKrd9PCae', 'PjMq3gda6', 'OaByBa3S9', 'q7MaOGsf7aLGYdlBDW', 'L4a4I3orFFcs3e4QVC', 'w4USVtspk', 'IMTpKTBB0'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, HUvQLPRDSnswoPbcPM.csHigh entropy of concatenated method names: 'v4jL28BIfS', 'ig5LdUhHjS', 'LvejJ8By4L', 'vU5jhvXk72', 'tNQjTHtYlD', 't6YjZwKnxy', 'eiOjFv3lrH', 'eorj4ad9HP', 'nPVjQfvOC1', 'ilCjg2ueaS'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, Bo0FOBdilP7qFKYcZAQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SYCpv4Xec4', 'TBFpEllCJO', 'fsXp3P9wwq', 'ailpGMFkkF', 'WQJp6NK6su', 'n9NpCYMRdq', 'bK2pAf2XdD'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, WpvUyIMbFNBNBEewoY.csHigh entropy of concatenated method names: 'yIDNxVOGmA', 'qvVNkR2138', 'ToString', 'MIANskDaqU', 'CHUNIrj4mb', 'WZkNjTQPct', 'mrgNLNE6E0', 'sCENw7WL3R', 'hTONoq3gXu', 'M4CNfToVeq'
          Source: 0.2.ysWQ4BqQrF.exe.361c218.1.raw.unpack, WLPOoi3IpRU3GTScqI.csHigh entropy of concatenated method names: 'kS67XGsOA1', 'zeU7NRy9lL', 'hRb778AiSQ', 'DXF7cKhc18', 'SEx75vfRiJ', 'WdJ7Ub7OtF', 'Dispose', 'xhUSsxU0VD', 'vFxSIemGCd', 'snhSjs7mOB'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, yYN3LZeGxkWglkjOZx.csHigh entropy of concatenated method names: 'QCQosIK7dd', 'hxlojreWXu', 'oKwowqhptK', 'PJYwrWR50H', 'WcYwzKeg06', 'sseoK70AEn', 'YQ9oMtDoXS', 'WVHoYtmZwl', 'VkvotC6hVg', 'IKRo0XGgmA'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, yr2deFq2f931OIfXoy.csHigh entropy of concatenated method names: 'UsebnvGtMq', 'uPubquO3Tg', 'SEpbmiscCU', 'l2LbWVwqBO', 'rM0bhvZE6J', 'hHBbT4hicr', 'Cl5bFxAeOJ', 'I39b4dAsDR', 'fXsbgPLZqb', 'DlZbvkcbiL'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, lpYAmXddBhtVd0vRZnW.csHigh entropy of concatenated method names: 'gsPprJAfXU', 'sRHpzLpsvv', 'b5JcKOMbPt', 'FjxcM2VelB', 'Bd6cY8pGwL', 'H9bctQj1VZ', 'av1c0CFJT5', 'Y9yc8aZeIJ', 'Gqacsl4KiU', 'F7vcItfn7x'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, JZnwkkYXCXji1Q8Kx0.csHigh entropy of concatenated method names: 'PwIIGNo3HJ', 'vvnI6o7cX3', 'OxCICBV0vB', 'ioxIAxh60l', 'xxGIHmEkUA', 'aksI1jD2CZ', 'asuIOZIOOY', 'ChmIVdgsML', 'RSIIif1B7a', 'mikIre9tVQ'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, kOuhoQrCmYX29rWygG.csHigh entropy of concatenated method names: 'rjPoex1JG2', 'OkGoPxEyCt', 'AqnoRU2RSS', 'RBHoBh6QiZ', 'pimo2RPVHA', 'vPxoa3cxaU', 'YpdodGKRy7', 'C7WonILtEK', 'qGqoqNCD49', 'sJwoy1PTQp'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, BOcxrtd5nSAGqrHLIuD.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fSVl7UtI97', 'L6YlpjYTmg', 'FIBlcNDKCr', 'UIvllR6uUZ', 'Kytl57AvyF', 'zeulu6ryRO', 'qE1lUNrGjB'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, BZQRJSjfxbAZaRWQR2.csHigh entropy of concatenated method names: 'ToString', 'I66Dv25Co9', 'KdgDWwTwyD', 'FoODJC8uTK', 'l46Dh7mKlG', 'moUDT8Asft', 's96DZ14OGT', 'fwuDFAyvgk', 'nkAD4QUIK8', 'NOODQ5KPn9'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, X42qarbak4yLRxGZZc.csHigh entropy of concatenated method names: 'Sllpju0PMG', 'gUFpLbFAdH', 'cDbpwA2cWQ', 'TOBpoKERIF', 'K2hp78XjJR', 'DqTpfoO0Rb', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, Rhbe9ek7JLU3oueh1L.csHigh entropy of concatenated method names: 'Dispose', 'JD1MibJmkP', 'WASYWpahHh', 'z4PlHLvf78', 'LdEMrNEFu3', 'tXWMzrcqup', 'ProcessDialogKey', 'j62YKk8yug', 'GBYYMt2etl', 'tq3YYPOVSB'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, QdMqp2hcRk37SFZxxe.csHigh entropy of concatenated method names: 'fS6NVNh5hI', 'nD8NrLBYBW', 'F6aSKqC3Nn', 'QsoSMY5vTn', 'MKBNvToB6s', 'BeoNEFc1BL', 'CwpN3F5Rhd', 'PMdNGP7oXC', 'vQlN6fJlof', 'cuaNCOfVuW'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, PR6Q88nJZ4tlIMTCQy.csHigh entropy of concatenated method names: 'TVdjBd1Ivb', 'tQ8ja88gRN', 'irwjnd7TfY', 'fjMjqhfPAE', 'wV5jX1WvpD', 'vuJjDoW8i7', 'qh6jN1w7Pi', 'HfvjSHnPo5', 'nkFj7fAZOG', 'R13jpsenmX'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, a4hSlqAP8NWEPYInyj.csHigh entropy of concatenated method names: 'wdm7mrLMQv', 'xQ17W2ISID', 'D2c7JR2e9F', 'gEN7hOyoVG', 'OpD7TwtBCi', 'hod7Z0WPpB', 'LHD7Fpt1E0', 'tv674npVjM', 'MT07QIB8VB', 'sc27gWyy1h'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, q6F2oxcomMvFsKZ5RC.csHigh entropy of concatenated method names: 'ew3t8xTUkS', 'nk8tsBv7Fd', 'U0qtIuSSPi', 'XmKtj9lOpX', 'ApctLH791v', 'NoRtwcRiYV', 'D3HtoaMooP', 'uqLtfNZupx', 'hrFt94xCqq', 'jkhtxe5Gm5'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, Vr5Id254pA7jDaWFEY.csHigh entropy of concatenated method names: 'XOaMo3USG9', 'niXMfUYFru', 'TGeMx0NkFw', 'Hn7MkKJuuI', 'LtfMX93Xu8', 'DLFMDLVHu2', 'WIdrMjD7n4LQFYa3ax', 'HTxCDTlrl2ifpmG6qF', 'O5uCQdZYEJhWCvH24F', 'AFfMMsYls9'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, BYXBa7J1Id9cWWmeie.csHigh entropy of concatenated method names: 'jaFw8TjaHq', 'ecMwI4DfCv', 'FRiwL3Fra3', 'hB6wox2IM4', 'CjnwfflVUt', 'PFOLH8UJJ2', 'Su6L1jFX4Z', 'KGJLOUA18H', 'uNmLVdpNjV', 'nSKLijiXp1'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, f4S276znUWDxrspgbt.csHigh entropy of concatenated method names: 'K36paM3T2m', 'HjLpnuXqK1', 'W78pq1b8Vk', 'kTopmIJFqM', 'p2dpW2AakM', 'NwrphIgryh', 'dyXpTi8deq', 'OCepUGYTP3', 'iU9pebFT9C', 'OKjpP3EKVg'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, zpZj8Iwb1BQtEkf8I7.csHigh entropy of concatenated method names: 'bCKRfK9O2', 'a3YBUBfjv', 'bcEa4uDEQ', 'SKrd9PCae', 'PjMq3gda6', 'OaByBa3S9', 'q7MaOGsf7aLGYdlBDW', 'L4a4I3orFFcs3e4QVC', 'w4USVtspk', 'IMTpKTBB0'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, HUvQLPRDSnswoPbcPM.csHigh entropy of concatenated method names: 'v4jL28BIfS', 'ig5LdUhHjS', 'LvejJ8By4L', 'vU5jhvXk72', 'tNQjTHtYlD', 't6YjZwKnxy', 'eiOjFv3lrH', 'eorj4ad9HP', 'nPVjQfvOC1', 'ilCjg2ueaS'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, Bo0FOBdilP7qFKYcZAQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SYCpv4Xec4', 'TBFpEllCJO', 'fsXp3P9wwq', 'ailpGMFkkF', 'WQJp6NK6su', 'n9NpCYMRdq', 'bK2pAf2XdD'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, WpvUyIMbFNBNBEewoY.csHigh entropy of concatenated method names: 'yIDNxVOGmA', 'qvVNkR2138', 'ToString', 'MIANskDaqU', 'CHUNIrj4mb', 'WZkNjTQPct', 'mrgNLNE6E0', 'sCENw7WL3R', 'hTONoq3gXu', 'M4CNfToVeq'
          Source: 0.2.ysWQ4BqQrF.exe.71a0000.4.raw.unpack, WLPOoi3IpRU3GTScqI.csHigh entropy of concatenated method names: 'kS67XGsOA1', 'zeU7NRy9lL', 'hRb778AiSQ', 'DXF7cKhc18', 'SEx75vfRiJ', 'WdJ7Ub7OtF', 'Dispose', 'xhUSsxU0VD', 'vFxSIemGCd', 'snhSjs7mOB'
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeFile created: C:\Users\user\AppData\Roaming\YNfDrfV.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp"

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x87 0x7E 0xEA
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: ysWQ4BqQrF.exe PID: 6408, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: YNfDrfV.exe PID: 372, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CD324
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105D0774
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CD944
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CD504
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CD544
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CD1E4
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105D0154
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CD8A4
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF9105CDA44
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 2589904 second address: 258990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 2589B7E second address: 2589B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cscript.exeRDTSC instruction interceptor: First address: 27A9904 second address: 27A990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cscript.exeRDTSC instruction interceptor: First address: 27A9B7E second address: 27A9B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: A50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: A50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: 8810000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: 7360000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: 9810000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: A810000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 1060000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 2A00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 8BD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 9BD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: 7470000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00409AB0 rdtsc 6_2_00409AB0
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6051Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3533Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 9878Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 872Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeWindow / User API: threadDelayed 2949Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeWindow / User API: threadDelayed 7021Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI coverage: 1.7 %
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exe TID: 6480Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1788Thread sleep time: -6456360425798339s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 7424Thread sleep count: 9878 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 7424Thread sleep time: -19756000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 7424Thread sleep count: 52 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 7424Thread sleep time: -104000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exe TID: 1064Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 7292Thread sleep count: 2949 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 7292Thread sleep time: -5898000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 7292Thread sleep count: 7021 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 7292Thread sleep time: -14042000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmstp.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmstp.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000007.00000002.2485688085.00000000070CF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000n
          Source: explorer.exe, 00000007.00000000.1256858174.000000000936A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
          Source: ysWQ4BqQrF.exe, 00000000.00000002.1265937596.0000000000655000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: explorer.exe, 00000007.00000002.2492681158.000000000934A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.000000000934A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000007.00000002.2492681158.00000000091E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.00000000091E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
          Source: explorer.exe, 00000007.00000002.2492681158.0000000009315000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.0000000009315000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW\MP
          Source: explorer.exe, 00000007.00000002.2492681158.0000000009474000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000l
          Source: explorer.exe, 00000007.00000002.2479086792.0000000000963000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000007.00000002.2492681158.0000000009474000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000007.00000000.1256858174.000000000955C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: explorer.exe, 00000007.00000002.2479086792.0000000000963000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00409AB0 rdtsc 6_2_00409AB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0040ACF0 LdrLoadDll,6_2_0040ACF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01568158 mov eax, dword ptr fs:[00000030h]6_2_01568158
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01564144 mov eax, dword ptr fs:[00000030h]6_2_01564144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01564144 mov eax, dword ptr fs:[00000030h]6_2_01564144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01564144 mov ecx, dword ptr fs:[00000030h]6_2_01564144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01564144 mov eax, dword ptr fs:[00000030h]6_2_01564144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01564144 mov eax, dword ptr fs:[00000030h]6_2_01564144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6154 mov eax, dword ptr fs:[00000030h]6_2_014D6154
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6154 mov eax, dword ptr fs:[00000030h]6_2_014D6154
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CC156 mov eax, dword ptr fs:[00000030h]6_2_014CC156
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01590115 mov eax, dword ptr fs:[00000030h]6_2_01590115
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157A118 mov ecx, dword ptr fs:[00000030h]6_2_0157A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157A118 mov eax, dword ptr fs:[00000030h]6_2_0157A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157A118 mov eax, dword ptr fs:[00000030h]6_2_0157A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157A118 mov eax, dword ptr fs:[00000030h]6_2_0157A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov eax, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov ecx, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov eax, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov eax, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov ecx, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov eax, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov eax, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov ecx, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov eax, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E10E mov ecx, dword ptr fs:[00000030h]6_2_0157E10E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01500124 mov eax, dword ptr fs:[00000030h]6_2_01500124
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E1D0 mov eax, dword ptr fs:[00000030h]6_2_0154E1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E1D0 mov eax, dword ptr fs:[00000030h]6_2_0154E1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E1D0 mov ecx, dword ptr fs:[00000030h]6_2_0154E1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E1D0 mov eax, dword ptr fs:[00000030h]6_2_0154E1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E1D0 mov eax, dword ptr fs:[00000030h]6_2_0154E1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015961C3 mov eax, dword ptr fs:[00000030h]6_2_015961C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015961C3 mov eax, dword ptr fs:[00000030h]6_2_015961C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015001F8 mov eax, dword ptr fs:[00000030h]6_2_015001F8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A61E5 mov eax, dword ptr fs:[00000030h]6_2_015A61E5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155019F mov eax, dword ptr fs:[00000030h]6_2_0155019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155019F mov eax, dword ptr fs:[00000030h]6_2_0155019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155019F mov eax, dword ptr fs:[00000030h]6_2_0155019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155019F mov eax, dword ptr fs:[00000030h]6_2_0155019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158C188 mov eax, dword ptr fs:[00000030h]6_2_0158C188
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158C188 mov eax, dword ptr fs:[00000030h]6_2_0158C188
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01510185 mov eax, dword ptr fs:[00000030h]6_2_01510185
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01574180 mov eax, dword ptr fs:[00000030h]6_2_01574180
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01574180 mov eax, dword ptr fs:[00000030h]6_2_01574180
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CA197 mov eax, dword ptr fs:[00000030h]6_2_014CA197
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CA197 mov eax, dword ptr fs:[00000030h]6_2_014CA197
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CA197 mov eax, dword ptr fs:[00000030h]6_2_014CA197
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556050 mov eax, dword ptr fs:[00000030h]6_2_01556050
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D2050 mov eax, dword ptr fs:[00000030h]6_2_014D2050
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FC073 mov eax, dword ptr fs:[00000030h]6_2_014FC073
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01554000 mov ecx, dword ptr fs:[00000030h]6_2_01554000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01572000 mov eax, dword ptr fs:[00000030h]6_2_01572000
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE016 mov eax, dword ptr fs:[00000030h]6_2_014EE016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE016 mov eax, dword ptr fs:[00000030h]6_2_014EE016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE016 mov eax, dword ptr fs:[00000030h]6_2_014EE016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE016 mov eax, dword ptr fs:[00000030h]6_2_014EE016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01566030 mov eax, dword ptr fs:[00000030h]6_2_01566030
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CA020 mov eax, dword ptr fs:[00000030h]6_2_014CA020
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CC020 mov eax, dword ptr fs:[00000030h]6_2_014CC020
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015520DE mov eax, dword ptr fs:[00000030h]6_2_015520DE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015120F0 mov ecx, dword ptr fs:[00000030h]6_2_015120F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D80E9 mov eax, dword ptr fs:[00000030h]6_2_014D80E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CA0E3 mov ecx, dword ptr fs:[00000030h]6_2_014CA0E3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015560E0 mov eax, dword ptr fs:[00000030h]6_2_015560E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CC0F0 mov eax, dword ptr fs:[00000030h]6_2_014CC0F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D208A mov eax, dword ptr fs:[00000030h]6_2_014D208A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015960B8 mov eax, dword ptr fs:[00000030h]6_2_015960B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015960B8 mov ecx, dword ptr fs:[00000030h]6_2_015960B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015680A8 mov eax, dword ptr fs:[00000030h]6_2_015680A8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155035C mov eax, dword ptr fs:[00000030h]6_2_0155035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155035C mov eax, dword ptr fs:[00000030h]6_2_0155035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155035C mov eax, dword ptr fs:[00000030h]6_2_0155035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155035C mov ecx, dword ptr fs:[00000030h]6_2_0155035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155035C mov eax, dword ptr fs:[00000030h]6_2_0155035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155035C mov eax, dword ptr fs:[00000030h]6_2_0155035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159A352 mov eax, dword ptr fs:[00000030h]6_2_0159A352
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01552349 mov eax, dword ptr fs:[00000030h]6_2_01552349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157437C mov eax, dword ptr fs:[00000030h]6_2_0157437C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A30B mov eax, dword ptr fs:[00000030h]6_2_0150A30B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A30B mov eax, dword ptr fs:[00000030h]6_2_0150A30B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A30B mov eax, dword ptr fs:[00000030h]6_2_0150A30B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CC310 mov ecx, dword ptr fs:[00000030h]6_2_014CC310
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F0310 mov ecx, dword ptr fs:[00000030h]6_2_014F0310
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015743D4 mov eax, dword ptr fs:[00000030h]6_2_015743D4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015743D4 mov eax, dword ptr fs:[00000030h]6_2_015743D4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E3DB mov eax, dword ptr fs:[00000030h]6_2_0157E3DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E3DB mov eax, dword ptr fs:[00000030h]6_2_0157E3DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E3DB mov ecx, dword ptr fs:[00000030h]6_2_0157E3DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157E3DB mov eax, dword ptr fs:[00000030h]6_2_0157E3DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA3C0 mov eax, dword ptr fs:[00000030h]6_2_014DA3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA3C0 mov eax, dword ptr fs:[00000030h]6_2_014DA3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA3C0 mov eax, dword ptr fs:[00000030h]6_2_014DA3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA3C0 mov eax, dword ptr fs:[00000030h]6_2_014DA3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA3C0 mov eax, dword ptr fs:[00000030h]6_2_014DA3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA3C0 mov eax, dword ptr fs:[00000030h]6_2_014DA3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D83C0 mov eax, dword ptr fs:[00000030h]6_2_014D83C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D83C0 mov eax, dword ptr fs:[00000030h]6_2_014D83C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D83C0 mov eax, dword ptr fs:[00000030h]6_2_014D83C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D83C0 mov eax, dword ptr fs:[00000030h]6_2_014D83C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158C3CD mov eax, dword ptr fs:[00000030h]6_2_0158C3CD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015563C0 mov eax, dword ptr fs:[00000030h]6_2_015563C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E03E9 mov eax, dword ptr fs:[00000030h]6_2_014E03E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015063FF mov eax, dword ptr fs:[00000030h]6_2_015063FF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE3F0 mov eax, dword ptr fs:[00000030h]6_2_014EE3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE3F0 mov eax, dword ptr fs:[00000030h]6_2_014EE3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE3F0 mov eax, dword ptr fs:[00000030h]6_2_014EE3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F438F mov eax, dword ptr fs:[00000030h]6_2_014F438F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F438F mov eax, dword ptr fs:[00000030h]6_2_014F438F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CE388 mov eax, dword ptr fs:[00000030h]6_2_014CE388
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CE388 mov eax, dword ptr fs:[00000030h]6_2_014CE388
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CE388 mov eax, dword ptr fs:[00000030h]6_2_014CE388
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C8397 mov eax, dword ptr fs:[00000030h]6_2_014C8397
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C8397 mov eax, dword ptr fs:[00000030h]6_2_014C8397
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C8397 mov eax, dword ptr fs:[00000030h]6_2_014C8397
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158A250 mov eax, dword ptr fs:[00000030h]6_2_0158A250
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158A250 mov eax, dword ptr fs:[00000030h]6_2_0158A250
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6259 mov eax, dword ptr fs:[00000030h]6_2_014D6259
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01558243 mov eax, dword ptr fs:[00000030h]6_2_01558243
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01558243 mov ecx, dword ptr fs:[00000030h]6_2_01558243
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CA250 mov eax, dword ptr fs:[00000030h]6_2_014CA250
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C826B mov eax, dword ptr fs:[00000030h]6_2_014C826B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01580274 mov eax, dword ptr fs:[00000030h]6_2_01580274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4260 mov eax, dword ptr fs:[00000030h]6_2_014D4260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4260 mov eax, dword ptr fs:[00000030h]6_2_014D4260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4260 mov eax, dword ptr fs:[00000030h]6_2_014D4260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C823B mov eax, dword ptr fs:[00000030h]6_2_014C823B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA2C3 mov eax, dword ptr fs:[00000030h]6_2_014DA2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA2C3 mov eax, dword ptr fs:[00000030h]6_2_014DA2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA2C3 mov eax, dword ptr fs:[00000030h]6_2_014DA2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA2C3 mov eax, dword ptr fs:[00000030h]6_2_014DA2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA2C3 mov eax, dword ptr fs:[00000030h]6_2_014DA2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E02E1 mov eax, dword ptr fs:[00000030h]6_2_014E02E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E02E1 mov eax, dword ptr fs:[00000030h]6_2_014E02E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E02E1 mov eax, dword ptr fs:[00000030h]6_2_014E02E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E284 mov eax, dword ptr fs:[00000030h]6_2_0150E284
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E284 mov eax, dword ptr fs:[00000030h]6_2_0150E284
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01550283 mov eax, dword ptr fs:[00000030h]6_2_01550283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01550283 mov eax, dword ptr fs:[00000030h]6_2_01550283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01550283 mov eax, dword ptr fs:[00000030h]6_2_01550283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E02A0 mov eax, dword ptr fs:[00000030h]6_2_014E02A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E02A0 mov eax, dword ptr fs:[00000030h]6_2_014E02A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015662A0 mov eax, dword ptr fs:[00000030h]6_2_015662A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015662A0 mov ecx, dword ptr fs:[00000030h]6_2_015662A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015662A0 mov eax, dword ptr fs:[00000030h]6_2_015662A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015662A0 mov eax, dword ptr fs:[00000030h]6_2_015662A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015662A0 mov eax, dword ptr fs:[00000030h]6_2_015662A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015662A0 mov eax, dword ptr fs:[00000030h]6_2_015662A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8550 mov eax, dword ptr fs:[00000030h]6_2_014D8550
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8550 mov eax, dword ptr fs:[00000030h]6_2_014D8550
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150656A mov eax, dword ptr fs:[00000030h]6_2_0150656A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150656A mov eax, dword ptr fs:[00000030h]6_2_0150656A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150656A mov eax, dword ptr fs:[00000030h]6_2_0150656A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01566500 mov eax, dword ptr fs:[00000030h]6_2_01566500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4500 mov eax, dword ptr fs:[00000030h]6_2_015A4500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE53E mov eax, dword ptr fs:[00000030h]6_2_014FE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE53E mov eax, dword ptr fs:[00000030h]6_2_014FE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE53E mov eax, dword ptr fs:[00000030h]6_2_014FE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE53E mov eax, dword ptr fs:[00000030h]6_2_014FE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE53E mov eax, dword ptr fs:[00000030h]6_2_014FE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0535 mov eax, dword ptr fs:[00000030h]6_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0535 mov eax, dword ptr fs:[00000030h]6_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0535 mov eax, dword ptr fs:[00000030h]6_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0535 mov eax, dword ptr fs:[00000030h]6_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0535 mov eax, dword ptr fs:[00000030h]6_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0535 mov eax, dword ptr fs:[00000030h]6_2_014E0535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A5D0 mov eax, dword ptr fs:[00000030h]6_2_0150A5D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A5D0 mov eax, dword ptr fs:[00000030h]6_2_0150A5D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D65D0 mov eax, dword ptr fs:[00000030h]6_2_014D65D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E5CF mov eax, dword ptr fs:[00000030h]6_2_0150E5CF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E5CF mov eax, dword ptr fs:[00000030h]6_2_0150E5CF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE5E7 mov eax, dword ptr fs:[00000030h]6_2_014FE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D25E0 mov eax, dword ptr fs:[00000030h]6_2_014D25E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C5ED mov eax, dword ptr fs:[00000030h]6_2_0150C5ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C5ED mov eax, dword ptr fs:[00000030h]6_2_0150C5ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E59C mov eax, dword ptr fs:[00000030h]6_2_0150E59C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D2582 mov eax, dword ptr fs:[00000030h]6_2_014D2582
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D2582 mov ecx, dword ptr fs:[00000030h]6_2_014D2582
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01504588 mov eax, dword ptr fs:[00000030h]6_2_01504588
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015505A7 mov eax, dword ptr fs:[00000030h]6_2_015505A7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015505A7 mov eax, dword ptr fs:[00000030h]6_2_015505A7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015505A7 mov eax, dword ptr fs:[00000030h]6_2_015505A7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F45B1 mov eax, dword ptr fs:[00000030h]6_2_014F45B1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F45B1 mov eax, dword ptr fs:[00000030h]6_2_014F45B1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158A456 mov eax, dword ptr fs:[00000030h]6_2_0158A456
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C645D mov eax, dword ptr fs:[00000030h]6_2_014C645D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150E443 mov eax, dword ptr fs:[00000030h]6_2_0150E443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F245A mov eax, dword ptr fs:[00000030h]6_2_014F245A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155C460 mov ecx, dword ptr fs:[00000030h]6_2_0155C460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FA470 mov eax, dword ptr fs:[00000030h]6_2_014FA470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FA470 mov eax, dword ptr fs:[00000030h]6_2_014FA470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FA470 mov eax, dword ptr fs:[00000030h]6_2_014FA470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01508402 mov eax, dword ptr fs:[00000030h]6_2_01508402
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01508402 mov eax, dword ptr fs:[00000030h]6_2_01508402
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01508402 mov eax, dword ptr fs:[00000030h]6_2_01508402
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A430 mov eax, dword ptr fs:[00000030h]6_2_0150A430
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CC427 mov eax, dword ptr fs:[00000030h]6_2_014CC427
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CE420 mov eax, dword ptr fs:[00000030h]6_2_014CE420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CE420 mov eax, dword ptr fs:[00000030h]6_2_014CE420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CE420 mov eax, dword ptr fs:[00000030h]6_2_014CE420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01556420 mov eax, dword ptr fs:[00000030h]6_2_01556420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D04E5 mov ecx, dword ptr fs:[00000030h]6_2_014D04E5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0158A49A mov eax, dword ptr fs:[00000030h]6_2_0158A49A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015044B0 mov ecx, dword ptr fs:[00000030h]6_2_015044B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155A4B0 mov eax, dword ptr fs:[00000030h]6_2_0155A4B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D64AB mov eax, dword ptr fs:[00000030h]6_2_014D64AB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01554755 mov eax, dword ptr fs:[00000030h]6_2_01554755
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512750 mov eax, dword ptr fs:[00000030h]6_2_01512750
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512750 mov eax, dword ptr fs:[00000030h]6_2_01512750
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155E75D mov eax, dword ptr fs:[00000030h]6_2_0155E75D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150674D mov esi, dword ptr fs:[00000030h]6_2_0150674D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150674D mov eax, dword ptr fs:[00000030h]6_2_0150674D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150674D mov eax, dword ptr fs:[00000030h]6_2_0150674D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0750 mov eax, dword ptr fs:[00000030h]6_2_014D0750
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8770 mov eax, dword ptr fs:[00000030h]6_2_014D8770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0770 mov eax, dword ptr fs:[00000030h]6_2_014E0770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01500710 mov eax, dword ptr fs:[00000030h]6_2_01500710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C700 mov eax, dword ptr fs:[00000030h]6_2_0150C700
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0710 mov eax, dword ptr fs:[00000030h]6_2_014D0710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154C730 mov eax, dword ptr fs:[00000030h]6_2_0154C730
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150273C mov eax, dword ptr fs:[00000030h]6_2_0150273C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150273C mov ecx, dword ptr fs:[00000030h]6_2_0150273C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150273C mov eax, dword ptr fs:[00000030h]6_2_0150273C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C720 mov eax, dword ptr fs:[00000030h]6_2_0150C720
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C720 mov eax, dword ptr fs:[00000030h]6_2_0150C720
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DC7C0 mov eax, dword ptr fs:[00000030h]6_2_014DC7C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015507C3 mov eax, dword ptr fs:[00000030h]6_2_015507C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F27ED mov eax, dword ptr fs:[00000030h]6_2_014F27ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F27ED mov eax, dword ptr fs:[00000030h]6_2_014F27ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F27ED mov eax, dword ptr fs:[00000030h]6_2_014F27ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155E7E1 mov eax, dword ptr fs:[00000030h]6_2_0155E7E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D47FB mov eax, dword ptr fs:[00000030h]6_2_014D47FB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D47FB mov eax, dword ptr fs:[00000030h]6_2_014D47FB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157678E mov eax, dword ptr fs:[00000030h]6_2_0157678E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D07AF mov eax, dword ptr fs:[00000030h]6_2_014D07AF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015847A0 mov eax, dword ptr fs:[00000030h]6_2_015847A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EC640 mov eax, dword ptr fs:[00000030h]6_2_014EC640
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01502674 mov eax, dword ptr fs:[00000030h]6_2_01502674
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A660 mov eax, dword ptr fs:[00000030h]6_2_0150A660
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A660 mov eax, dword ptr fs:[00000030h]6_2_0150A660
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159866E mov eax, dword ptr fs:[00000030h]6_2_0159866E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159866E mov eax, dword ptr fs:[00000030h]6_2_0159866E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E260B mov eax, dword ptr fs:[00000030h]6_2_014E260B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01512619 mov eax, dword ptr fs:[00000030h]6_2_01512619
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E609 mov eax, dword ptr fs:[00000030h]6_2_0154E609
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D262C mov eax, dword ptr fs:[00000030h]6_2_014D262C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EE627 mov eax, dword ptr fs:[00000030h]6_2_014EE627
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01506620 mov eax, dword ptr fs:[00000030h]6_2_01506620
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01508620 mov eax, dword ptr fs:[00000030h]6_2_01508620
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A6C7 mov ebx, dword ptr fs:[00000030h]6_2_0150A6C7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A6C7 mov eax, dword ptr fs:[00000030h]6_2_0150A6C7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015506F1 mov eax, dword ptr fs:[00000030h]6_2_015506F1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015506F1 mov eax, dword ptr fs:[00000030h]6_2_015506F1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E6F2 mov eax, dword ptr fs:[00000030h]6_2_0154E6F2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E6F2 mov eax, dword ptr fs:[00000030h]6_2_0154E6F2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E6F2 mov eax, dword ptr fs:[00000030h]6_2_0154E6F2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E6F2 mov eax, dword ptr fs:[00000030h]6_2_0154E6F2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4690 mov eax, dword ptr fs:[00000030h]6_2_014D4690
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4690 mov eax, dword ptr fs:[00000030h]6_2_014D4690
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015066B0 mov eax, dword ptr fs:[00000030h]6_2_015066B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C6A6 mov eax, dword ptr fs:[00000030h]6_2_0150C6A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01550946 mov eax, dword ptr fs:[00000030h]6_2_01550946
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155C97C mov eax, dword ptr fs:[00000030h]6_2_0155C97C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F6962 mov eax, dword ptr fs:[00000030h]6_2_014F6962
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F6962 mov eax, dword ptr fs:[00000030h]6_2_014F6962
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F6962 mov eax, dword ptr fs:[00000030h]6_2_014F6962
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01574978 mov eax, dword ptr fs:[00000030h]6_2_01574978
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01574978 mov eax, dword ptr fs:[00000030h]6_2_01574978
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0151096E mov eax, dword ptr fs:[00000030h]6_2_0151096E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0151096E mov edx, dword ptr fs:[00000030h]6_2_0151096E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0151096E mov eax, dword ptr fs:[00000030h]6_2_0151096E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155C912 mov eax, dword ptr fs:[00000030h]6_2_0155C912
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C8918 mov eax, dword ptr fs:[00000030h]6_2_014C8918
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C8918 mov eax, dword ptr fs:[00000030h]6_2_014C8918
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E908 mov eax, dword ptr fs:[00000030h]6_2_0154E908
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154E908 mov eax, dword ptr fs:[00000030h]6_2_0154E908
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0156892B mov eax, dword ptr fs:[00000030h]6_2_0156892B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155892A mov eax, dword ptr fs:[00000030h]6_2_0155892A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015049D0 mov eax, dword ptr fs:[00000030h]6_2_015049D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159A9D3 mov eax, dword ptr fs:[00000030h]6_2_0159A9D3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015669C0 mov eax, dword ptr fs:[00000030h]6_2_015669C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA9D0 mov eax, dword ptr fs:[00000030h]6_2_014DA9D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA9D0 mov eax, dword ptr fs:[00000030h]6_2_014DA9D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA9D0 mov eax, dword ptr fs:[00000030h]6_2_014DA9D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA9D0 mov eax, dword ptr fs:[00000030h]6_2_014DA9D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA9D0 mov eax, dword ptr fs:[00000030h]6_2_014DA9D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DA9D0 mov eax, dword ptr fs:[00000030h]6_2_014DA9D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015029F9 mov eax, dword ptr fs:[00000030h]6_2_015029F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015029F9 mov eax, dword ptr fs:[00000030h]6_2_015029F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155E9E0 mov eax, dword ptr fs:[00000030h]6_2_0155E9E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D09AD mov eax, dword ptr fs:[00000030h]6_2_014D09AD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D09AD mov eax, dword ptr fs:[00000030h]6_2_014D09AD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015589B3 mov esi, dword ptr fs:[00000030h]6_2_015589B3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015589B3 mov eax, dword ptr fs:[00000030h]6_2_015589B3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015589B3 mov eax, dword ptr fs:[00000030h]6_2_015589B3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01500854 mov eax, dword ptr fs:[00000030h]6_2_01500854
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4859 mov eax, dword ptr fs:[00000030h]6_2_014D4859
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D4859 mov eax, dword ptr fs:[00000030h]6_2_014D4859
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01566870 mov eax, dword ptr fs:[00000030h]6_2_01566870
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01566870 mov eax, dword ptr fs:[00000030h]6_2_01566870
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155E872 mov eax, dword ptr fs:[00000030h]6_2_0155E872
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155E872 mov eax, dword ptr fs:[00000030h]6_2_0155E872
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155C810 mov eax, dword ptr fs:[00000030h]6_2_0155C810
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150A830 mov eax, dword ptr fs:[00000030h]6_2_0150A830
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157483A mov eax, dword ptr fs:[00000030h]6_2_0157483A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157483A mov eax, dword ptr fs:[00000030h]6_2_0157483A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2835 mov eax, dword ptr fs:[00000030h]6_2_014F2835
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2835 mov eax, dword ptr fs:[00000030h]6_2_014F2835
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2835 mov eax, dword ptr fs:[00000030h]6_2_014F2835
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2835 mov ecx, dword ptr fs:[00000030h]6_2_014F2835
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2835 mov eax, dword ptr fs:[00000030h]6_2_014F2835
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F2835 mov eax, dword ptr fs:[00000030h]6_2_014F2835
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FE8C0 mov eax, dword ptr fs:[00000030h]6_2_014FE8C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C8F9 mov eax, dword ptr fs:[00000030h]6_2_0150C8F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150C8F9 mov eax, dword ptr fs:[00000030h]6_2_0150C8F9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159A8E4 mov eax, dword ptr fs:[00000030h]6_2_0159A8E4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155C89D mov eax, dword ptr fs:[00000030h]6_2_0155C89D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0887 mov eax, dword ptr fs:[00000030h]6_2_014D0887
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157EB50 mov eax, dword ptr fs:[00000030h]6_2_0157EB50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01584B4B mov eax, dword ptr fs:[00000030h]6_2_01584B4B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01584B4B mov eax, dword ptr fs:[00000030h]6_2_01584B4B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01578B42 mov eax, dword ptr fs:[00000030h]6_2_01578B42
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01566B40 mov eax, dword ptr fs:[00000030h]6_2_01566B40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01566B40 mov eax, dword ptr fs:[00000030h]6_2_01566B40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0159AB40 mov eax, dword ptr fs:[00000030h]6_2_0159AB40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014CCB7E mov eax, dword ptr fs:[00000030h]6_2_014CCB7E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154EB1D mov eax, dword ptr fs:[00000030h]6_2_0154EB1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FEB20 mov eax, dword ptr fs:[00000030h]6_2_014FEB20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FEB20 mov eax, dword ptr fs:[00000030h]6_2_014FEB20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01598B28 mov eax, dword ptr fs:[00000030h]6_2_01598B28
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01598B28 mov eax, dword ptr fs:[00000030h]6_2_01598B28
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0BCD mov eax, dword ptr fs:[00000030h]6_2_014D0BCD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0BCD mov eax, dword ptr fs:[00000030h]6_2_014D0BCD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0BCD mov eax, dword ptr fs:[00000030h]6_2_014D0BCD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F0BCB mov eax, dword ptr fs:[00000030h]6_2_014F0BCB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F0BCB mov eax, dword ptr fs:[00000030h]6_2_014F0BCB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F0BCB mov eax, dword ptr fs:[00000030h]6_2_014F0BCB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157EBD0 mov eax, dword ptr fs:[00000030h]6_2_0157EBD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155CBF0 mov eax, dword ptr fs:[00000030h]6_2_0155CBF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FEBFC mov eax, dword ptr fs:[00000030h]6_2_014FEBFC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8BF0 mov eax, dword ptr fs:[00000030h]6_2_014D8BF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8BF0 mov eax, dword ptr fs:[00000030h]6_2_014D8BF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8BF0 mov eax, dword ptr fs:[00000030h]6_2_014D8BF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01584BB0 mov eax, dword ptr fs:[00000030h]6_2_01584BB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01584BB0 mov eax, dword ptr fs:[00000030h]6_2_01584BB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0BBE mov eax, dword ptr fs:[00000030h]6_2_014E0BBE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0BBE mov eax, dword ptr fs:[00000030h]6_2_014E0BBE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0A5B mov eax, dword ptr fs:[00000030h]6_2_014E0A5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014E0A5B mov eax, dword ptr fs:[00000030h]6_2_014E0A5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D6A50 mov eax, dword ptr fs:[00000030h]6_2_014D6A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154CA72 mov eax, dword ptr fs:[00000030h]6_2_0154CA72
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0154CA72 mov eax, dword ptr fs:[00000030h]6_2_0154CA72
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0157EA60 mov eax, dword ptr fs:[00000030h]6_2_0157EA60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150CA6F mov eax, dword ptr fs:[00000030h]6_2_0150CA6F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150CA6F mov eax, dword ptr fs:[00000030h]6_2_0150CA6F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150CA6F mov eax, dword ptr fs:[00000030h]6_2_0150CA6F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0155CA11 mov eax, dword ptr fs:[00000030h]6_2_0155CA11
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FEA2E mov eax, dword ptr fs:[00000030h]6_2_014FEA2E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150CA38 mov eax, dword ptr fs:[00000030h]6_2_0150CA38
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150CA24 mov eax, dword ptr fs:[00000030h]6_2_0150CA24
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F4A35 mov eax, dword ptr fs:[00000030h]6_2_014F4A35
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014F4A35 mov eax, dword ptr fs:[00000030h]6_2_014F4A35
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01504AD0 mov eax, dword ptr fs:[00000030h]6_2_01504AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01504AD0 mov eax, dword ptr fs:[00000030h]6_2_01504AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0AD0 mov eax, dword ptr fs:[00000030h]6_2_014D0AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01526ACC mov eax, dword ptr fs:[00000030h]6_2_01526ACC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01526ACC mov eax, dword ptr fs:[00000030h]6_2_01526ACC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01526ACC mov eax, dword ptr fs:[00000030h]6_2_01526ACC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150AAEE mov eax, dword ptr fs:[00000030h]6_2_0150AAEE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0150AAEE mov eax, dword ptr fs:[00000030h]6_2_0150AAEE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01508A90 mov edx, dword ptr fs:[00000030h]6_2_01508A90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014DEA80 mov eax, dword ptr fs:[00000030h]6_2_014DEA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_015A4A80 mov eax, dword ptr fs:[00000030h]6_2_015A4A80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8AA0 mov eax, dword ptr fs:[00000030h]6_2_014D8AA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8AA0 mov eax, dword ptr fs:[00000030h]6_2_014D8AA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01526AA4 mov eax, dword ptr fs:[00000030h]6_2_01526AA4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0D59 mov eax, dword ptr fs:[00000030h]6_2_014D0D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0D59 mov eax, dword ptr fs:[00000030h]6_2_014D0D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D0D59 mov eax, dword ptr fs:[00000030h]6_2_014D0D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8D59 mov eax, dword ptr fs:[00000030h]6_2_014D8D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8D59 mov eax, dword ptr fs:[00000030h]6_2_014D8D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8D59 mov eax, dword ptr fs:[00000030h]6_2_014D8D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8D59 mov eax, dword ptr fs:[00000030h]6_2_014D8D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014D8D59 mov eax, dword ptr fs:[00000030h]6_2_014D8D59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01568D6B mov eax, dword ptr fs:[00000030h]6_2_01568D6B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01588D10 mov eax, dword ptr fs:[00000030h]6_2_01588D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01588D10 mov eax, dword ptr fs:[00000030h]6_2_01588D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01504D1D mov eax, dword ptr fs:[00000030h]6_2_01504D1D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EAD00 mov eax, dword ptr fs:[00000030h]6_2_014EAD00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EAD00 mov eax, dword ptr fs:[00000030h]6_2_014EAD00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014EAD00 mov eax, dword ptr fs:[00000030h]6_2_014EAD00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C6D10 mov eax, dword ptr fs:[00000030h]6_2_014C6D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C6D10 mov eax, dword ptr fs:[00000030h]6_2_014C6D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014C6D10 mov eax, dword ptr fs:[00000030h]6_2_014C6D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01558D20 mov eax, dword ptr fs:[00000030h]6_2_01558D20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01554DD7 mov eax, dword ptr fs:[00000030h]6_2_01554DD7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_01554DD7 mov eax, dword ptr fs:[00000030h]6_2_01554DD7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_014FEDD3 mov eax, dword ptr fs:[00000030h]6_2_014FEDD3
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 15.197.225.128 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.69.61 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.64.1 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 92.112.189.41 80Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe"
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeNtQueueApcThread: Indirect: 0x142A4F2Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeNtClose: Indirect: 0x171A56C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeNtQueueApcThread: Indirect: 0x171A4F2Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeNtClose: Indirect: 0x142A56C
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\SysWOW64\cscript.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\SysWOW64\cscript.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread register set: target process: 496Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeThread register set: target process: 496Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread register set: target process: 496Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection unmapped: C:\Windows\SysWOW64\cmstp.exe base address: 140000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection unmapped: C:\Windows\SysWOW64\cscript.exe base address: 1E0000Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D4A008Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F4D008Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YNfDrfV.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp299E.tmp"Jump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YNfDrfV" /XML "C:\Users\user\AppData\Local\Temp\tmp35B3.tmp"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: explorer.exe, 00000007.00000000.1249998615.0000000000949000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2479086792.0000000000949000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanh
          Source: explorer.exe, 00000007.00000000.1253340661.0000000004510000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2480899625.00000000010F1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000002.2492681158.00000000094C7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000007.00000002.2480899625.00000000010F1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1250455699.00000000010F1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000007.00000002.2480899625.00000000010F1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1250455699.00000000010F1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerW
          Source: explorer.exe, 00000007.00000002.2480899625.00000000010F1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1250455699.00000000010F1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeQueries volume information: C:\Users\user\Desktop\ysWQ4BqQrF.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeQueries volume information: C:\Users\user\AppData\Roaming\YNfDrfV.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\YNfDrfV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ysWQ4BqQrF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.2479408214.0000000002B10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1307896206.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2478604450.0000000002580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.1354407609.00000000027A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1269762480.00000000034F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1316836574.0000000003AF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.2479481626.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          812
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          321
          Security Software Discovery
          Remote Services1
          Credential API Hooking
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Shared Modules
          1
          DLL Side-Loading
          1
          Scheduled Task/Job
          1
          Masquerading
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          4
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          Abuse Elevation Control Mechanism
          11
          Disable or Modify Tools
          Security Account Manager41
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          41
          Virtualization/Sandbox Evasion
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script812
          Process Injection
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials212
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Abuse Elevation Control Mechanism
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
          Obfuscated Files or Information
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
          Software Packing
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          Timestomp
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
          DLL Side-Loading
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634563 Sample: ysWQ4BqQrF.exe Startdate: 11/03/2025 Architecture: WINDOWS Score: 100 57 www.play-vanguard-nirvana.xyz 2->57 59 www.kpde.xyz 2->59 61 5 other IPs or domains 2->61 81 Suricata IDS alerts for network traffic 2->81 83 Found malware configuration 2->83 85 Malicious sample detected (through community Yara rule) 2->85 89 12 other signatures 2->89 11 ysWQ4BqQrF.exe 7 2->11         started        15 YNfDrfV.exe 5 2->15         started        signatures3 87 Performs DNS queries to domains with low reputation 59->87 process4 file5 49 C:\Users\user\AppData\Roaming\YNfDrfV.exe, PE32 11->49 dropped 51 C:\Users\user\...\YNfDrfV.exe:Zone.Identifier, ASCII 11->51 dropped 53 C:\Users\user\AppData\Local\...\tmp299E.tmp, XML 11->53 dropped 55 C:\Users\user\AppData\...\ysWQ4BqQrF.exe.log, ASCII 11->55 dropped 99 Uses schtasks.exe or at.exe to add and modify task schedules 11->99 101 Writes to foreign memory regions 11->101 103 Allocates memory in foreign processes 11->103 105 Adds a directory exclusion to Windows Defender 11->105 17 RegSvcs.exe 11->17         started        20 powershell.exe 23 11->20         started        22 schtasks.exe 1 11->22         started        107 Antivirus detection for dropped file 15->107 109 Multi AV Scanner detection for dropped file 15->109 111 Injects a PE file into a foreign processes 15->111 24 RegSvcs.exe 15->24         started        26 schtasks.exe 1 15->26         started        signatures6 process7 signatures8 69 Modifies the context of a thread in another process (thread injection) 17->69 71 Maps a DLL or memory area into another process 17->71 73 Sample uses process hollowing technique 17->73 79 2 other signatures 17->79 28 explorer.exe 29 1 17->28 injected 75 Loading BitLocker PowerShell Module 20->75 32 WmiPrvSE.exe 20->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        77 Found direct / indirect Syscall (likely to bypass EDR) 24->77 38 conhost.exe 26->38         started        process9 dnsIp10 63 kpde.xyz 92.112.189.41, 49696, 80 UKRTELNETUA Ukraine 28->63 65 alliancecigars.net 15.197.225.128, 49694, 80 TANDEMUS United States 28->65 67 2 other IPs or domains 28->67 113 System process connects to network (likely due to code injection or exploit) 28->113 40 cmstp.exe 28->40         started        43 cscript.exe 28->43         started        signatures11 process12 signatures13 91 Modifies the context of a thread in another process (thread injection) 40->91 93 Maps a DLL or memory area into another process 40->93 95 Tries to detect virtualization through RDTSC time measurements 40->95 97 Switches to a custom stack to bypass stack traces 40->97 45 cmd.exe 1 40->45         started        process14 process15 47 conhost.exe 45->47         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ysWQ4BqQrF.exe74%ReversingLabsByteCode-MSIL.Backdoor.FormBook
          ysWQ4BqQrF.exe75%VirustotalBrowse
          ysWQ4BqQrF.exe100%AviraTR/Kryptik.enuja
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\YNfDrfV.exe100%AviraTR/Kryptik.enuja
          C:\Users\user\AppData\Roaming\YNfDrfV.exe74%ReversingLabsByteCode-MSIL.Backdoor.FormBook
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.isbnu.shop/egs9/www.aigamestudio.xyz100%Avira URL Cloudmalware
          https://android.notify.windows.com/iOSV0%Avira URL Cloudsafe
          http://ns.adobeJH0%Avira URL Cloudsafe
          http://www.hikingk.storeReferer:0%Avira URL Cloudsafe
          http://www.alliancecigars.net/egs9/www.flippinforbidsfrear.cloud100%Avira URL Cloudmalware
          http://www.evel789-aman.club/egs9/www.redgoodsgather.shop100%Avira URL Cloudmalware
          http://www.flippinforbidsfrear.cloud/egs9/www.kpde.xyz100%Avira URL Cloudmalware
          https://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZ100%Avira URL Cloudmalware
          https://word.office.comZ0%Avira URL Cloudsafe
          www.redgoodsgather.shop/egs9/100%Avira URL Cloudmalware
          http://www.petir99bro.xyzReferer:0%Avira URL Cloudsafe
          http://www.flippinforbidsfrear.cloud/egs9/?K8elV=WY6dXz4hP2USskFVaG6AmVG36gfocnqcJNOT/iAq7eLnPv9oQtDKLFR9qtIXXXVluDfsS1HcVA==&mVfp=MTrLPvVhZLm100%Avira URL Cloudmalware
          http://www.evel789-aman.club100%Avira URL Cloudmalware
          http://www.kongou.systems100%Avira URL Cloudmalware
          http://www.hikingk.store/egs9/www.isbnu.shop0%Avira URL Cloudsafe
          http://www.imstest.online100%Avira URL Cloudmalware
          http://www.mentagekript.today/egs9/100%Avira URL Cloudmalware
          http://www.flippinforbidsfrear.cloud/egs9/100%Avira URL Cloudmalware
          http://www.redgoodsgather.shop/egs9/100%Avira URL Cloudmalware
          http://www.653emd.top100%Avira URL Cloudmalware
          http://www.play-vanguard-nirvana.xyzReferer:0%Avira URL Cloudsafe
          http://www.redgoodsgather.shop/egs9/www.mentagekript.today100%Avira URL Cloudmalware
          http://www.imstest.onlineReferer:0%Avira URL Cloudsafe
          http://schemas.microsof0%Avira URL Cloudsafe
          http://www.mentagekript.today100%Avira URL Cloudmalware
          http://www.play-vanguard-nirvana.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDzbC4NqmTLwL8cGw==100%Avira URL Cloudmalware
          http://www.redgoodsgather.shopReferer:0%Avira URL Cloudsafe
          http://www.play-vanguard-nirvana.xyz/egs9/www.imstest.online100%Avira URL Cloudmalware
          http://www.alliancecigars.netReferer:0%Avira URL Cloudsafe
          http://www.alliancecigars.net/egs9/?mVfp=MTrLPvVhZLm&K8elV=wA+abWeWfQrMiE4bW8SGLQYY6mDtYGtq3v+j3Td9NN12kduRfWzJue6T+YpGJtlAkwGAydKR6g==100%Avira URL Cloudmalware
          http://www.kongou.systems/egs9/100%Avira URL Cloudmalware
          http://www.evel789-aman.club/egs9/100%Avira URL Cloudmalware
          https://outlook.comP;0%Avira URL Cloudsafe
          http://www.alliancecigars.net/egs9/100%Avira URL Cloudmalware
          http://www.creativege.xyzReferer:0%Avira URL Cloudsafe
          http://www.flippinforbidsfrear.cloudReferer:0%Avira URL Cloudsafe
          http://www.creativege.xyz/egs9/100%Avira URL Cloudmalware
          http://www.imstest.online/egs9/100%Avira URL Cloudmalware
          http://www.imstest.online/egs9/www.alliancecigars.net100%Avira URL Cloudmalware
          http://www.aigamestudio.xyz100%Avira URL Cloudmalware
          http://www.kpde.xyzReferer:0%Avira URL Cloudsafe
          http://www.petir99bro.xyz100%Avira URL Cloudmalware
          http://www.aigamestudio.xyz/egs9/www.petir99bro.xyz100%Avira URL Cloudmalware
          http://www.kpde.xyz/egs9/100%Avira URL Cloudmalware
          http://www.petir99bro.xyz/egs9/www.kongou.systems100%Avira URL Cloudmalware
          http://www.isbnu.shop100%Avira URL Cloudmalware
          http://www.t59bm675ri.skinReferer:0%Avira URL Cloudsafe
          http://www.petir99bro.xyz/egs9/100%Avira URL Cloudmalware
          http://www.kpde.xyz/egs9/www.t59bm675ri.skin100%Avira URL Cloudmalware
          http://www.hikingk.store0%Avira URL Cloudsafe
          http://www.alliancecigars.net100%Avira URL Cloudmalware
          http://www.653emd.top/egs9/100%Avira URL Cloudmalware
          http://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZM/DO1jiE4CQOHh/KO/hOdc1w==100%Avira URL Cloudmalware
          http://www.kongou.systemsReferer:0%Avira URL Cloudsafe
          http://www.aigamestudio.xyz/egs9/100%Avira URL Cloudmalware
          http://www.evel789-aman.clubReferer:0%Avira URL Cloudsafe
          http://www.mentagekript.todayReferer:0%Avira URL Cloudsafe
          http://www.isbnu.shopReferer:0%Avira URL Cloudsafe
          http://www.isbnu.shop/egs9/100%Avira URL Cloudmalware
          http://www.t59bm675ri.skin100%Avira URL Cloudmalware
          http://www.creativege.xyz/egs9/www.hikingk.store100%Avira URL Cloudmalware
          http://www.mentagekript.today/egs9/www.653emd.top100%Avira URL Cloudmalware
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz0%Avira URL Cloudsafe
          http://www.hikingk.store/egs9/0%Avira URL Cloudsafe
          http://www.kpde.xyz100%Avira URL Cloudmalware
          http://www.play-vanguard-nirvana.xyz/egs9/100%Avira URL Cloudmalware
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark0%Avira URL Cloudsafe
          http://www.t59bm675ri.skin/egs9/www.evel789-aman.club100%Avira URL Cloudmalware
          http://www.t59bm675ri.skin/egs9/100%Avira URL Cloudmalware
          http://www.aigamestudio.xyzReferer:0%Avira URL Cloudsafe
          http://www.redgoodsgather.shop100%Avira URL Cloudmalware
          http://www.653emd.topReferer:0%Avira URL Cloudsafe
          http://www.flippinforbidsfrear.cloud100%Avira URL Cloudmalware
          http://www.653emd.top/egs9/www.creativege.xyz100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.play-vanguard-nirvana.xyz
          104.21.64.1
          truetrue
            unknown
            kpde.xyz
            92.112.189.41
            truetrue
              unknown
              www.flippinforbidsfrear.cloud
              104.21.69.61
              truetrue
                unknown
                alliancecigars.net
                15.197.225.128
                truetrue
                  unknown
                  www.alliancecigars.net
                  unknown
                  unknowntrue
                    unknown
                    www.kpde.xyz
                    unknown
                    unknowntrue
                      unknown
                      www.imstest.online
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        www.redgoodsgather.shop/egs9/true
                        • Avira URL Cloud: malware
                        unknown
                        http://www.flippinforbidsfrear.cloud/egs9/?K8elV=WY6dXz4hP2USskFVaG6AmVG36gfocnqcJNOT/iAq7eLnPv9oQtDKLFR9qtIXXXVluDfsS1HcVA==&mVfp=MTrLPvVhZLmtrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.play-vanguard-nirvana.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDzbC4NqmTLwL8cGw==true
                        • Avira URL Cloud: malware
                        unknown
                        http://www.alliancecigars.net/egs9/?mVfp=MTrLPvVhZLm&K8elV=wA+abWeWfQrMiE4bW8SGLQYY6mDtYGtq3v+j3Td9NN12kduRfWzJue6T+YpGJtlAkwGAydKR6g==true
                        • Avira URL Cloud: malware
                        unknown
                        http://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZM/DO1jiE4CQOHh/KO/hOdc1w==true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.kpde.xyz/egs9/?mVfp=MTrLPvVhZLm&K8elV=fanjuyis9OEXqqgHmTGuWHUOyMSWU2Qq009AAAE4Y9ljRR84yZexplorer.exe, 00000007.00000002.2500429577.000000001137F000.00000004.80000000.00040000.00000000.sdmp, cmstp.exe, 00000010.00000002.2481620369.00000000050EF000.00000004.10000000.00040000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.flippinforbidsfrear.cloud/egs9/www.kpde.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://android.notify.windows.com/iOSVexplorer.exe, 00000007.00000002.2497114349.000000000BE5D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE5D000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngFexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://www.evel789-aman.club/egs9/www.redgoodsgather.shopexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://word.office.comZexplorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://ns.adobeJHexplorer.exe, 00000007.00000002.2483177153.0000000004415000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1252446139.0000000004415000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.alliancecigars.net/egs9/www.flippinforbidsfrear.cloudexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              https://excel.office.comexplorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://www.hikingk.storeReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.isbnu.shop/egs9/www.aigamestudio.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.flippinforbidsfrear.cloud/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameriexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    http://www.petir99bro.xyzReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.kongou.systemsexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.evel789-aman.clubexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.mentagekript.today/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.imstest.onlineexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.redgoodsgather.shop/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.hikingk.store/egs9/www.isbnu.shopexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.653emd.topexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://wns.windows.com/explorer.exe, 00000007.00000002.2497114349.000000000BD56000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BD56000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameysWQ4BqQrF.exe, 00000000.00000002.1267972369.0000000002401000.00000004.00000800.00020000.00000000.sdmp, YNfDrfV.exe, 00000008.00000002.1307720399.0000000002A4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.microsofexplorer.exe, 00000007.00000002.2498060693.000000000C0D7000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.play-vanguard-nirvana.xyzReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.redgoodsgather.shop/egs9/www.mentagekript.todayexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.imstest.onlineReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.mentagekript.todayexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.alliancecigars.netReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.play-vanguard-nirvana.xyz/egs9/www.imstest.onlineexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.redgoodsgather.shopReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.kongou.systems/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://outlook.comP;explorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&ocexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppgrexplorer.exe, 00000007.00000002.2497114349.000000000BE5D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE5D000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                http://www.evel789-aman.club/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.imstest.online/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.creativege.xyz/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://android.notify.windows.com/iOSexplorer.exe, 00000007.00000002.2497114349.000000000BE5D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE5D000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.creativege.xyzReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.flippinforbidsfrear.cloudReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-explorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.alliancecigars.net/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.aigamestudio.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.imstest.online/egs9/www.alliancecigars.netexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.kpde.xyzReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.petir99bro.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.aigamestudio.xyz/egs9/www.petir99bro.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.kpde.xyz/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.isbnu.shopexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.petir99bro.xyz/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.kpde.xyz/egs9/www.t59bm675ri.skinexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.t59bm675ri.skinReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.petir99bro.xyz/egs9/www.kongou.systemsexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.hikingk.storeexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://schemas.microexplorer.exe, 00000007.00000000.1254434187.00000000077B0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000002.2490367876.00000000077A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1254368362.0000000007700000.00000002.00000001.00040000.00000000.sdmpfalse
                                                        high
                                                        http://www.alliancecigars.netexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://www.653emd.top/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://www.kongou.systemsReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.aigamestudio.xyz/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.mentagekript.todayReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-quexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.isbnu.shopReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.t59bm675ri.skinexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://www.evel789-aman.clubReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.isbnu.shop/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://www.creativege.xyz/egs9/www.hikingk.storeexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://www.mentagekript.today/egs9/www.653emd.topexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhzexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.hikingk.store/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              https://powerpoint.office.comexplorer.exe, 00000007.00000002.2497114349.000000000BE14000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1262378990.000000000BE14000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.kpde.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                http://www.t59bm675ri.skin/egs9/www.evel789-aman.clubexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-darkexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AAexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.play-vanguard-nirvana.xyz/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  http://www.t59bm675ri.skin/egs9/explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  http://www.aigamestudio.xyzReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://www.redgoodsgather.shopexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  http://www.653emd.topReferer:explorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://api.msn.com/v1/news/Feed/Windows?3explorer.exe, 00000007.00000002.2492681158.00000000091E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1256858174.00000000091E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-cexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reveexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.flippinforbidsfrear.cloudexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        http://www.653emd.top/egs9/www.creativege.xyzexplorer.exe, 00000007.00000002.2498060693.000000000C07E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nationexplorer.exe, 00000007.00000000.1253596709.0000000007124000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.2485688085.0000000007124000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://api.msn.com/explorer.exe, 00000007.00000000.1256858174.00000000092FD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            15.197.225.128
                                                                            alliancecigars.netUnited States
                                                                            7430TANDEMUStrue
                                                                            104.21.69.61
                                                                            www.flippinforbidsfrear.cloudUnited States
                                                                            13335CLOUDFLARENETUStrue
                                                                            104.21.64.1
                                                                            www.play-vanguard-nirvana.xyzUnited States
                                                                            13335CLOUDFLARENETUStrue
                                                                            92.112.189.41
                                                                            kpde.xyzUkraine
                                                                            6849UKRTELNETUAtrue
                                                                            Joe Sandbox version:42.0.0 Malachite
                                                                            Analysis ID:1634563
                                                                            Start date and time:2025-03-11 01:32:39 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 9m 9s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:25
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:1
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:ysWQ4BqQrF.exe
                                                                            renamed because original name is a hash value
                                                                            Original Sample Name:ef4948765f8caae1f84b2199e785842e19e49c39630422c12a603c93d3e6b4b4.exe
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.evad.winEXE@163/11@5/4
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HCA Information:
                                                                            • Successful, ratio: 100%
                                                                            • Number of executed functions: 115
                                                                            • Number of non-executed functions: 308
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                            • Excluded IPs from analysis (whitelisted): 23.60.203.209, 172.202.163.200, 20.109.210.53
                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            TimeTypeDescription
                                                                            01:33:37Task SchedulerRun new task: YNfDrfV path: C:\Users\user\AppData\Roaming\YNfDrfV.exe
                                                                            20:33:35API Interceptor1x Sleep call for process: ysWQ4BqQrF.exe modified
                                                                            20:33:37API Interceptor12x Sleep call for process: powershell.exe modified
                                                                            20:33:38API Interceptor1x Sleep call for process: YNfDrfV.exe modified
                                                                            20:33:39API Interceptor1387313x Sleep call for process: explorer.exe modified
                                                                            20:34:22API Interceptor1603692x Sleep call for process: cmstp.exe modified
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            15.197.225.128New order supply.exeGet hashmaliciousFormBookBrowse
                                                                            • www.asd.xyz/mg63/?_TAT3f=UfdXJdopwhMD&nHuxmL=hgsIXgenzHj9Fkp6isw5BpuEkHtEb16KEV9dCbOGsgIaBwgoQwsGBGK5T7l+ed3Z6T90
                                                                            http://www.schoolboxstuff.comGet hashmaliciousUnknownBrowse
                                                                            • www.schoolboxstuff.com/
                                                                            rMTO.exeGet hashmaliciousFormBookBrowse
                                                                            • www.asd.xyz/mg63/?Wr=hgsIXgenzHj9Fkp6isw5BpuEkHtEb16KEV9dCbOGsgIaBwgoQwsGBGK5T4duIMbh7zclEm4g7A==&GFNL1=9r1DJRB85
                                                                            http://yesincs.comGet hashmaliciousUnknownBrowse
                                                                            • yesincs.com/
                                                                            http://wtsevent.comGet hashmaliciousTechSupportScamBrowse
                                                                            • wtsevent.com/
                                                                            RyJhC2oYnM.exeGet hashmaliciousPonyBrowse
                                                                            • abes.co/forum/viewtopic.php
                                                                            236236236.elfGet hashmaliciousUnknownBrowse
                                                                            • littlemoneybigmoneyracing.com/
                                                                            Lab07-01.exeGet hashmaliciousUnknownBrowse
                                                                            • www.practicalmalwareanalysis.com/ODA6NmU6NmY6NmU6Njk6NjMtam9uZXMa/a.png
                                                                            Lab07-01.exeGet hashmaliciousUnknownBrowse
                                                                            • www.practicalmalwareanalysis.com/ODA6NmU6NmY6NmU6Njk6NjMtam9uZXMa/a.png
                                                                            URGENT REQUEST FOR QUOTATION.exeGet hashmaliciousFormBookBrowse
                                                                            • www.linkwave.cloud/l8vr/
                                                                            104.21.64.1TXzf0xX2uq.exeGet hashmaliciousLokibotBrowse
                                                                            • touxzw.ir/tking3/five/fre.php
                                                                            begin.exeGet hashmaliciousDarkTortilla, FormBookBrowse
                                                                            • www.kdrqcyusevx.info/z84n/
                                                                            Payment receipt PO 1437 1_ Payment receipt PO #1437 2.exeGet hashmaliciousLokibotBrowse
                                                                            • touxzw.ir/fix/five/fre.php
                                                                            Payment.exeGet hashmaliciousLokibotBrowse
                                                                            • touxzw.ir/sccc/five/fre.php
                                                                            7RryusxiMtHBz80.exeGet hashmaliciousLokibotBrowse
                                                                            • touxzw.ir/sss2/five/fre.php
                                                                            Request for quotation -6001845515-XLSX.exeGet hashmaliciousLokibotBrowse
                                                                            • touxzw.ir/tking3/five/fre.php
                                                                            vsf098633534.exeGet hashmaliciousLokibotBrowse
                                                                            • touxzw.ir/sccc/five/fre.php
                                                                            laser.ps1Get hashmaliciousFormBookBrowse
                                                                            • www.lucynoel6465.shop/jgkl/
                                                                            UPDATED SOA.pdf.exeGet hashmaliciousFormBookBrowse
                                                                            • www.shlomi.app/t3l4/
                                                                            QUOTE OF DRY DOCK REPAIR.exeGet hashmaliciousFormBookBrowse
                                                                            • www.arryongro-nambe.live/ljgq/
                                                                            No context
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            UKRTELNETUAsh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                                            • 92.112.68.144
                                                                            jklmpsl.elfGet hashmaliciousUnknownBrowse
                                                                            • 37.55.245.40
                                                                            apep.m68k.elfGet hashmaliciousUnknownBrowse
                                                                            • 178.95.206.201
                                                                            u.elfGet hashmaliciousUnknownBrowse
                                                                            • 95.133.64.36
                                                                            apep.ppc.elfGet hashmaliciousUnknownBrowse
                                                                            • 92.113.237.46
                                                                            jklarm7.elfGet hashmaliciousUnknownBrowse
                                                                            • 37.52.39.65
                                                                            nabarm.elfGet hashmaliciousUnknownBrowse
                                                                            • 178.95.235.41
                                                                            cbr.mips.elfGet hashmaliciousMiraiBrowse
                                                                            • 46.201.252.65
                                                                            splppc.elfGet hashmaliciousUnknownBrowse
                                                                            • 95.133.64.20
                                                                            splarm5.elfGet hashmaliciousUnknownBrowse
                                                                            • 37.52.188.197
                                                                            TANDEMUSOnline Notification.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                            • 15.197.254.78
                                                                            ulQGCeP6wq.exeGet hashmaliciousFormBookBrowse
                                                                            • 15.197.172.60
                                                                            https://0utl00k_secure_pdfsharing.wesendit.com/dl/9WeFG1R9WGJTbgaCO/a3Jpc3RhbC5wbGFpc3RlZEBzb2RleG8uY29t__;!!P5FZM7ryyeY!UznDjsW7gO6EJncqNmJhgeM1Zawk4R__aUyCoG6Jb-mYlr-79K2gn3tFm6bOpnkuKuN_n69fA8HZASZsr-9bQyk$Get hashmaliciousUnknownBrowse
                                                                            • 15.197.198.189
                                                                            https://aa1selfstorage.com/ioeloro/?wptouch_switch=mobile&redirect=//gamma.app/docs/Untitled-fw6wys6ubo63z1u?mode=present#card-wdvd2twm5f65uwlGet hashmaliciousUnknownBrowse
                                                                            • 15.197.213.252
                                                                            https://aa1selfstorage.com/ioeloro/?wptouch_switch=mobile&redirect=//gamma.app/docs/Untitled-fw6wys6ubo63z1u?mode=present#card-wdvd2twm5f65uwlGet hashmaliciousUnknownBrowse
                                                                            • 15.197.213.252
                                                                            nabppc.elfGet hashmaliciousUnknownBrowse
                                                                            • 128.88.27.27
                                                                            Cbonline Q1 Handbook-0782794.pdfGet hashmaliciousHTMLPhisher, Invisible JSBrowse
                                                                            • 15.197.175.4
                                                                            updated quotation.exeGet hashmaliciousFormBookBrowse
                                                                            • 15.197.172.60
                                                                            updated quotation.exeGet hashmaliciousFormBookBrowse
                                                                            • 15.197.172.60
                                                                            http://paytrace.comGet hashmaliciousUnknownBrowse
                                                                            • 15.197.193.217
                                                                            CLOUDFLARENETUSyXNsOgimLV.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 104.21.16.1
                                                                            hh01FRs81x.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.96.1
                                                                            2k3GtCY6Zz.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.41.115
                                                                            yXNsOgimLV.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 104.21.16.1
                                                                            yxoY9FvULu.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 104.26.13.205
                                                                            QS1BxkXZoD.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.54.112
                                                                            amXZOaAQ8i.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                            • 104.21.80.1
                                                                            UhuGtHUgHf.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.16.1
                                                                            LmK9xpRW3B.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.79.189
                                                                            TXzf0xX2uq.exeGet hashmaliciousLokibotBrowse
                                                                            • 104.21.64.1
                                                                            CLOUDFLARENETUSyXNsOgimLV.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 104.21.16.1
                                                                            hh01FRs81x.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.96.1
                                                                            2k3GtCY6Zz.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.41.115
                                                                            yXNsOgimLV.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 104.21.16.1
                                                                            yxoY9FvULu.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 104.26.13.205
                                                                            QS1BxkXZoD.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.54.112
                                                                            amXZOaAQ8i.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                            • 104.21.80.1
                                                                            UhuGtHUgHf.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.16.1
                                                                            LmK9xpRW3B.exeGet hashmaliciousFormBookBrowse
                                                                            • 104.21.79.189
                                                                            TXzf0xX2uq.exeGet hashmaliciousLokibotBrowse
                                                                            • 104.21.64.1
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\AppData\Roaming\YNfDrfV.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1216
                                                                            Entropy (8bit):5.34331486778365
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84qXKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3ogvitHo6hAHKzea
                                                                            MD5:E193AFF55D4BDD9951CB4287A7D79653
                                                                            SHA1:F94AD920B9E0EB43B5005D74552AB84EAA38E985
                                                                            SHA-256:08DD5825B4EDCC256AEB08525DCBCDA342252A9C9746BE23FBC70A801F5A596E
                                                                            SHA-512:86F6ECDB47C1A7FFA460F3BC6038ACAFC9D4DED4D1E8D1FB7B8FE9145D9D384AB4EE7A7C3BE959A25B265AFEDB8FD31BA10073EC116B65BFE3326EF2C53394E6
                                                                            Malicious:false
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a