Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
laser.ps1

Overview

General Information

Sample name:laser.ps1
Analysis ID:1618204
MD5:7adf90b15de76e42932fa5e94c56a53d
SHA1:675add13ec03deafbab37b6dfb03e78afcbd1cdc
SHA256:1e03c070596fbe0b9568f8348fe91c6c0ec4c1f5540e48b1039940d47671205d
Tags:ps1tumbetgirislinki-fituser-JAMESWT_MHT
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains very large strings
Allocates memory in foreign processes
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 8104 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 8112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • x.exe (PID: 5972 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 3A25D6429B34E260762DBEBB8D67AC09)
      • RegAsm.exe (PID: 6704 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • UmhFZco3dB3hLZpEx5uvm.exe (PID: 6240 cmdline: "C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\8EIn9gst2.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • runonce.exe (PID: 3488 cmdline: "C:\Windows\SysWOW64\runonce.exe" MD5: 9E16655119DDE1B24A741C4FD4AD08FC)
            • UmhFZco3dB3hLZpEx5uvm.exe (PID: 6720 cmdline: "C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\h4nXbCfA2.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
            • firefox.exe (PID: 6972 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • notepad.exe (PID: 7648 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\laser.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.1752374705.0000000003F10000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000A.00000002.1748675402.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000D.00000002.2538512938.0000000003000000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000E.00000002.2540611173.00000000055C0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          0000000A.00000002.1749625509.0000000002560000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            10.2.RegAsm.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              10.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1496, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1", ProcessId: 8104, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1496, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1", ProcessId: 8104, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-18T18:37:14.871378+010028554651A Network Trojan was detected192.168.2.1049975162.218.30.23580TCP
                2025-02-18T18:37:43.794383+010028554651A Network Trojan was detected192.168.2.1049979103.106.67.11280TCP
                2025-02-18T18:37:57.339174+010028554651A Network Trojan was detected192.168.2.1049983104.21.80.180TCP
                2025-02-18T18:38:12.008048+010028554651A Network Trojan was detected192.168.2.1049987104.21.64.180TCP
                2025-02-18T18:38:27.533272+010028554651A Network Trojan was detected192.168.2.1049991134.122.133.8080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-18T18:37:36.021397+010028554641A Network Trojan was detected192.168.2.1049976103.106.67.11280TCP
                2025-02-18T18:37:38.613700+010028554641A Network Trojan was detected192.168.2.1049977103.106.67.11280TCP
                2025-02-18T18:37:41.254634+010028554641A Network Trojan was detected192.168.2.1049978103.106.67.11280TCP
                2025-02-18T18:37:50.348646+010028554641A Network Trojan was detected192.168.2.1049980104.21.80.180TCP
                2025-02-18T18:37:52.641774+010028554641A Network Trojan was detected192.168.2.1049981104.21.80.180TCP
                2025-02-18T18:37:55.442051+010028554641A Network Trojan was detected192.168.2.1049982104.21.80.180TCP
                2025-02-18T18:38:04.220935+010028554641A Network Trojan was detected192.168.2.1049984104.21.64.180TCP
                2025-02-18T18:38:07.043109+010028554641A Network Trojan was detected192.168.2.1049985104.21.64.180TCP
                2025-02-18T18:38:09.563384+010028554641A Network Trojan was detected192.168.2.1049986104.21.64.180TCP
                2025-02-18T18:38:18.532056+010028554641A Network Trojan was detected192.168.2.1049988134.122.133.8080TCP
                2025-02-18T18:38:22.390272+010028554641A Network Trojan was detected192.168.2.1049989134.122.133.8080TCP
                2025-02-18T18:38:24.954593+010028554641A Network Trojan was detected192.168.2.1049990134.122.133.8080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.l63339.xyz/vhr7/?6Z=-H-lpHxHXdyXU&zXA0DPZ=iaSfD1StI7hDT4qIAMii2AJAHOe0qHDn7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4v0DPw8ZKuIrimVv8q0baHQHWMGFSag==Avira URL Cloud: Label: malware
                Source: http://www.tumbetgirislinki.fit/k566/?6Z=-H-lpHxHXdyXU&zXA0DPZ=RARW43WNMKajmHoYlEtIRJLMiezSzeuXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe9MdLjldesQy1X4jE5qPq3kNjfMeWlg==Avira URL Cloud: Label: malware
                Source: http://www.seasay.xyz/c9ts/?zXA0DPZ=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7Tzpj06nHFHBYiovfB8EPfZSo8Ynzvw==&6Z=-H-lpHxHXdyXUAvira URL Cloud: Label: malware
                Source: http://www.lucynoel6465.shop/jgkl/?zXA0DPZ=hI+cEEoDMRK5HtHlz4V8IEOzbfVROUzo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2DlpZ+IqhGLZDTm5oFY7qBVg0wNSO9VUqA==&6Z=-H-lpHxHXdyXUAvira URL Cloud: Label: malware
                Source: https://www.seasay.xyz/c9ts/?zXA0DPZ=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAAvira URL Cloud: Label: malware
                Source: http://www.kjuw.party/e0jv/?zXA0DPZ=T5a+nPXa7vHYgORYo4/nz9dQiuUIDqRyja1Bw4L97U3J4ftOxLqNqCnP0drWj2p7z+i5x9/xm7UTGnu+MMyQiOsx+uzJdiaZpwcLV+HQfwIlPX06/Q==&6Z=-H-lpHxHXdyXUAvira URL Cloud: Label: malware
                Source: http://www.kjuw.party/e0jv/Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
                Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 79%
                Source: laser.ps1Virustotal: Detection: 49%Perma Link
                Source: laser.ps1ReversingLabs: Detection: 37%
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.1752374705.0000000003F10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1748675402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538512938.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2540611173.00000000055C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1749625509.0000000002560000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2538511146.00000000041E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538743686.0000000004900000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2528459776.0000000002C20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Binary string: runonce.pdbGCTL source: RegAsm.exe, 0000000A.00000002.1749320441.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2535807080.00000000012EE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: RegAsm.exe, 0000000A.00000002.1749802100.00000000027C0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1751415139.00000000049B6000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1748918282.000000000480A000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004CFE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004B60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 0000000A.00000002.1749802100.00000000027C0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, runonce.exe, 0000000D.00000003.1751415139.00000000049B6000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1748918282.000000000480A000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004CFE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004B60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: runonce.pdb source: RegAsm.exe, 0000000A.00000002.1749320441.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2535807080.00000000012EE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: CXDFGDF.pdb source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000009.00000000.1292172273.0000000000242000.00000002.00000001.01000000.0000000A.sdmp, x.exe.2.dr
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000000.1672162976.000000000040F000.00000002.00000001.01000000.0000000B.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000000.1817091071.000000000040F000.00000002.00000001.01000000.0000000B.sdmp
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C3C8D0 FindFirstFileW,FindNextFileW,FindClose,13_2_02C3C8D0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

                Software Vulnerabilities

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 4x nop then xor eax, eax13_2_02C29EF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 4x nop then mov ebx, 00000004h13_2_04A004E8
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055F4D7F
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055F4D3B
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then xor eax, eax14_2_055E977E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055E5F70
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055E3F81
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055F4E64
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055F4E17
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055F4EF5
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 4x nop then pop edi14_2_055E5905

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49975 -> 162.218.30.235:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49985 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49986 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49989 -> 134.122.133.80:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49976 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49991 -> 134.122.133.80:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49983 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49979 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49988 -> 134.122.133.80:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49977 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49982 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49987 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49990 -> 134.122.133.80:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49978 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49984 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49980 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49981 -> 104.21.80.1:80
                Source: DNS query: www.l63339.xyz
                Source: DNS query: www.seasay.xyz
                Source: Joe Sandbox ViewIP Address: 103.106.67.112 103.106.67.112
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewIP Address: 134.122.133.80 134.122.133.80
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /vhr7/?6Z=-H-lpHxHXdyXU&zXA0DPZ=iaSfD1StI7hDT4qIAMii2AJAHOe0qHDn7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4v0DPw8ZKuIrimVv8q0baHQHWMGFSag== HTTP/1.1Host: www.l63339.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /c9ts/?zXA0DPZ=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7Tzpj06nHFHBYiovfB8EPfZSo8Ynzvw==&6Z=-H-lpHxHXdyXU HTTP/1.1Host: www.seasay.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /k566/?6Z=-H-lpHxHXdyXU&zXA0DPZ=RARW43WNMKajmHoYlEtIRJLMiezSzeuXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe9MdLjldesQy1X4jE5qPq3kNjfMeWlg== HTTP/1.1Host: www.tumbetgirislinki.fitAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /jgkl/?zXA0DPZ=hI+cEEoDMRK5HtHlz4V8IEOzbfVROUzo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2DlpZ+IqhGLZDTm5oFY7qBVg0wNSO9VUqA==&6Z=-H-lpHxHXdyXU HTTP/1.1Host: www.lucynoel6465.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /e0jv/?zXA0DPZ=T5a+nPXa7vHYgORYo4/nz9dQiuUIDqRyja1Bw4L97U3J4ftOxLqNqCnP0drWj2p7z+i5x9/xm7UTGnu+MMyQiOsx+uzJdiaZpwcLV+HQfwIlPX06/Q==&6Z=-H-lpHxHXdyXU HTTP/1.1Host: www.kjuw.partyAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficDNS traffic detected: DNS query: www.l63339.xyz
                Source: global trafficDNS traffic detected: DNS query: www.seasay.xyz
                Source: global trafficDNS traffic detected: DNS query: www.tumbetgirislinki.fit
                Source: global trafficDNS traffic detected: DNS query: www.lucynoel6465.shop
                Source: global trafficDNS traffic detected: DNS query: www.kjuw.party
                Source: unknownHTTP traffic detected: POST /c9ts/ HTTP/1.1Host: www.seasay.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateOrigin: http://www.seasay.xyzReferer: http://www.seasay.xyz/c9ts/Content-Length: 196Cache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5Data Raw: 7a 58 41 30 44 50 5a 3d 57 30 4a 59 34 44 6c 67 38 7a 6d 57 35 46 36 57 58 32 78 58 4d 50 49 78 69 4a 75 36 49 52 48 59 6e 55 4c 6b 7a 41 74 66 75 65 4b 75 72 51 35 70 50 52 74 73 32 58 79 46 63 6c 75 6f 49 52 59 54 59 4b 44 4b 54 43 74 31 59 32 2f 49 30 47 63 49 70 45 34 70 57 54 45 55 36 4b 7a 67 50 58 5a 69 6f 64 6d 78 4c 71 6f 66 58 49 2b 4c 37 36 62 4b 35 66 52 48 31 69 32 65 45 32 57 75 44 59 42 30 36 32 51 56 2f 32 4d 73 62 32 48 6b 75 32 32 5a 47 36 32 51 35 4f 2b 50 30 55 43 61 74 4b 43 4f 31 2f 65 31 62 32 39 4d 74 42 6d 38 77 75 38 61 2b 52 35 79 54 54 4e 70 66 38 65 37 Data Ascii: zXA0DPZ=W0JY4Dlg8zmW5F6WX2xXMPIxiJu6IRHYnULkzAtfueKurQ5pPRts2XyFcluoIRYTYKDKTCt1Y2/I0GcIpE4pWTEU6KzgPXZiodmxLqofXI+L76bK5fRH1i2eE2WuDYB062QV/2Msb2Hku22ZG62Q5O+P0UCatKCO1/e1b29MtBm8wu8a+R5yTTNpf8e7
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:37:52 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0cf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RhrOjvAM9uUKolVb4InL3VmReNioe7TRgE3HOmt48g%2Fxm6nKR1vR1eyFOpVK9%2BJr887ncLwlFh3ER4InECKf3FT6C75%2FkGC%2BoWW0MUfptoe8FSCbUDBrjceEmPPvU18tr%2F5lSdxHBq4Vehs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fc99b78f17652-SEAContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=67059&min_rtt=67059&rtt_var=33529&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=843&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 63 62 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 59 59 93 a3 48 92 7e ef 5f a1 ed b5 35 9b 31 2a 87 fb ca ee 1a 5b 6e 90 04 e2 16 e8 8d 1b c4 29 6e 69 6c fe fb 9a b2 aa 7b aa b2 a4 ea ea 9d 7d d8 78 11 41 84 bb 87 bb 7f fe 79 24 f9 d3 4f 3f fd fa 1f fc 81 b3 7d 5d d8 e4 63 5d fd fd a7 5f 3f fd 6c 36 9b cd af 79 12 c4 9f 1f eb 64 0c 36 f9 38 76 2f c9 65 2a e6 8f 3f 73 6d 33 26 cd f8 32 5e bb e4 e7 4d f4 69 f6 f1 e7 31 59 47 f0 ae e2 97 4d 94 07 fd 90 8c 1f a7 31 7d a1 7e 7e aa 27 88 f2 e4 e5 2e df b7 d5 17 8a 9a f6 25 ba 2f 3d 15 d4 fb 20 ab 83 3f 23 21 ac 5d d1 27 c3 17 22 d0 57 7b 9b a0 4e 3e fe 3c 17 c9 d2 b5 fd f8 c5 b6 a5 88 c7 fc 63 9c cc 45 94 bc bc 4d 3e 6c 8a a6 18 8b a0 7a 19 a2 a0 4a 3e c2 7f fb 5d d5 58 8c 55 f2 77 0c c2 36 5a 3b 6e c4 76 6a e2 5f c1 4f 2f 3f 6d 18 c6 6b 95 6c ee 71 fb 1c ae 68 18 3e 0b df 47 d8 c6 d7 cd 3f 7e 9f de 47 da 36 e3 4b 1a d4 45 75 7d dd 30 7d 11 54 1f 36 72 52 cd c9 58 44 c1 87 cd 10 34 c3 cb 90 f4 45 fa cb b7 62 43 71 4b 5e 37 30 d6 ad 5f 2f 56 45 93 bc e4 49 91 e5 e3 eb 06 Data Ascii: fcbYYH~_51*[n)nil{}xAy$O?}]c]_?l6yd68v/e*?sm3&2^Mi1YGM1}~~'.%/= ?#!]'"W{N><cEM>lzJ>]XUw6Z;nvj_O/?mklqh>G?~G6KEu}0}T6rRXD4EbCqK^70_/VEI
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:37:57 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeAccept-Ranges: bytesCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0cf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RC307wLlfONcV22%2FHLpOk35rr%2FFwOOBqr5VuEgElLyEMCzVp%2B8nOCaBqIxB2W7XMMCZ49lO424tdNkyCuOykUIU4j38muZh2GvgoAXKfrucG%2FenrRneA2%2BF%2F1QhLabh8HuZ7DhgRC8Jj%2BLY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fc9bacd11e857-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=37306&min_rtt=37306&rtt_var=18653&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=548&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 61 32 66 0d 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a Data Ascii: 2a2f<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0">
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:38:04 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JcPawhsr9T%2BA14CReHCOQhrw4I66GB01kA4mXTeSKnkbIZDbfJxlBxNYLs6mltcBDN1U%2Bp7i94pSGFdW5QmjgnWok5EDhTUleSU43MmeiJSDF5AQyicL2GySxfPF5gNSRYzC4WnuA6g%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fc9e6b96c71f8-LHRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=71479&min_rtt=71479&rtt_var=35739&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=810&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 74(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:38:06 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=77bs53Av04iUzMkQMVCsPVxMfzGVoWvjEMP5qqz83keNIaH9cOvYncRnLA4VRpFZz7%2FbaOYiSoUo19ib4fGLF3g9bEgkOq4ct5cnKoiaOwd5C9pk6FCMBqcGLLsxBCXwL2HHo32rJdg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fc9f6dbdd76bb-SEAContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=67236&min_rtt=67236&rtt_var=33618&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=834&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 74(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:38:09 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=A3mUqzH8F4ImIQ%2BHA5WFJV3h4WFETqULZqi%2FI0J6w76EcrDsliyJhr2plFvGQkLoPolULlJPFl7cQ0NsL3yGMPPheHrLtun9LgGFMHt%2B7BWFdKHvRBDWaAIkdbFkjQ2s5gZR8w2K09o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fca068d6176b4-SEAContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=67108&min_rtt=67108&rtt_var=33554&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1847&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 36 61 0d 0a b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f6a(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:38:11 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bxwAYGSrP979%2BYUNPU1T26%2FoJOdruH%2BrCbIlJIhLok1KRKs7mFB%2F3wUwk2Q7ymKtdenty9T3TANLHvXmRUdzM%2BDkdA20A6oXxqdY%2FC8abxw%2Bhs1ktCk9rbtat57c2CkY73j066E%2BdKQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fca162ca2a29f-YULalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=17506&min_rtt=17506&rtt_var=8753&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=545&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 39 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 99<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0</center></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:38:18 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:38:22 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:38:24 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:38:27 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: runonce.exe, 0000000D.00000002.2540650822.0000000005898000.00000004.10000000.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2539195431.0000000003898000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
                Source: x.exe, 00000009.00000002.1308549108.0000000000B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
                Source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000002.00000002.1298965787.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1308771649.0000000007670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000002.00000002.1298965787.0000000005051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000002.00000002.1298965787.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1308771649.0000000007670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2540611173.000000000562F000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.kjuw.party
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2540611173.000000000562F000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.kjuw.party/e0jv/
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: powershell.exe, 00000002.00000002.1298965787.0000000005051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: powershell.exe, 00000002.00000002.1298965787.00000000051A6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1308771649.0000000007670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002EB5000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1942060200.0000000002EB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: runonce.exe, 0000000D.00000003.1942060200.0000000002EB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033~
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: runonce.exe, 0000000D.00000003.1940893094.0000000007B80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: runonce.exe, 0000000D.00000003.1947011375.0000000007C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2539195431.0000000003706000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.seasay.xyz/c9ts/?zXA0DPZ=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExA
                Source: runonce.exe, 0000000D.00000002.2540650822.0000000005574000.00000004.10000000.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2539195431.0000000003574000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.2057913770.00000000285E4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&amp;topId=86884/vhr7/
                Source: runonce.exe, 0000000D.00000002.2540650822.0000000005574000.00000004.10000000.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2539195431.0000000003574000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.2057913770.00000000285E4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&topId=86884/vhr7/

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.1752374705.0000000003F10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1748675402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538512938.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2540611173.00000000055C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1749625509.0000000002560000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2538511146.00000000041E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538743686.0000000004900000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2528459776.0000000002C20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: Process Memory Space: powershell.exe PID: 8104, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: x.exe.2.dr, Idbi0WY----jg--iKh--Qk-D-.csLong String: Length: 385720
                Source: 2.2.powershell.exe.66d7ef8.0.raw.unpack, Idbi0WY----jg--iKh--Qk-D-.csLong String: Length: 385720
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0042CAA3 NtClose,10_2_0042CAA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832B60 NtClose,LdrInitializeThunk,10_2_02832B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_02832C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_02832DF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028335C0 NtCreateMutant,LdrInitializeThunk,10_2_028335C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02834340 NtSetContextThread,10_2_02834340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02834650 NtSuspendThread,10_2_02834650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832AB0 NtWaitForSingleObject,10_2_02832AB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832AD0 NtReadFile,10_2_02832AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832AF0 NtWriteFile,10_2_02832AF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832B80 NtQueryInformationFile,10_2_02832B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832BA0 NtEnumerateValueKey,10_2_02832BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832BE0 NtQueryValueKey,10_2_02832BE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832BF0 NtAllocateVirtualMemory,10_2_02832BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832E80 NtReadVirtualMemory,10_2_02832E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832EA0 NtAdjustPrivilegesToken,10_2_02832EA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832EE0 NtQueueApcThread,10_2_02832EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832E30 NtWriteVirtualMemory,10_2_02832E30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832F90 NtProtectVirtualMemory,10_2_02832F90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832FA0 NtQuerySection,10_2_02832FA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832FB0 NtResumeThread,10_2_02832FB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832FE0 NtCreateFile,10_2_02832FE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832F30 NtCreateSection,10_2_02832F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832F60 NtCreateProcessEx,10_2_02832F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832CA0 NtQueryInformationToken,10_2_02832CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832CC0 NtQueryVirtualMemory,10_2_02832CC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832CF0 NtOpenProcess,10_2_02832CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832C00 NtQueryInformationProcess,10_2_02832C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832C60 NtCreateKey,10_2_02832C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832DB0 NtEnumerateKey,10_2_02832DB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832DD0 NtDelayExecution,10_2_02832DD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832D00 NtSetInformationFile,10_2_02832D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832D10 NtMapViewOfSection,10_2_02832D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832D30 NtUnmapViewOfSection,10_2_02832D30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02833090 NtSetValueKey,10_2_02833090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02833010 NtOpenDirectoryObject,10_2_02833010
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028339B0 NtGetContextThread,10_2_028339B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02833D10 NtOpenProcessToken,10_2_02833D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02833D70 NtOpenThread,10_2_02833D70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD4650 NtSuspendThread,LdrInitializeThunk,13_2_04BD4650
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD4340 NtSetContextThread,LdrInitializeThunk,13_2_04BD4340
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2CA0 NtQueryInformationToken,LdrInitializeThunk,13_2_04BD2CA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2C70 NtFreeVirtualMemory,LdrInitializeThunk,13_2_04BD2C70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2C60 NtCreateKey,LdrInitializeThunk,13_2_04BD2C60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2DF0 NtQuerySystemInformation,LdrInitializeThunk,13_2_04BD2DF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2DD0 NtDelayExecution,LdrInitializeThunk,13_2_04BD2DD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2D30 NtUnmapViewOfSection,LdrInitializeThunk,13_2_04BD2D30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2D10 NtMapViewOfSection,LdrInitializeThunk,13_2_04BD2D10
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2E80 NtReadVirtualMemory,LdrInitializeThunk,13_2_04BD2E80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2EE0 NtQueueApcThread,LdrInitializeThunk,13_2_04BD2EE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2FB0 NtResumeThread,LdrInitializeThunk,13_2_04BD2FB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2FE0 NtCreateFile,LdrInitializeThunk,13_2_04BD2FE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2F30 NtCreateSection,LdrInitializeThunk,13_2_04BD2F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2AF0 NtWriteFile,LdrInitializeThunk,13_2_04BD2AF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2AD0 NtReadFile,LdrInitializeThunk,13_2_04BD2AD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2BA0 NtEnumerateValueKey,LdrInitializeThunk,13_2_04BD2BA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,13_2_04BD2BF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2BE0 NtQueryValueKey,LdrInitializeThunk,13_2_04BD2BE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2B60 NtClose,LdrInitializeThunk,13_2_04BD2B60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD35C0 NtCreateMutant,LdrInitializeThunk,13_2_04BD35C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD39B0 NtGetContextThread,LdrInitializeThunk,13_2_04BD39B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2CF0 NtOpenProcess,13_2_04BD2CF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2CC0 NtQueryVirtualMemory,13_2_04BD2CC0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2C00 NtQueryInformationProcess,13_2_04BD2C00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2DB0 NtEnumerateKey,13_2_04BD2DB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2D00 NtSetInformationFile,13_2_04BD2D00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2EA0 NtAdjustPrivilegesToken,13_2_04BD2EA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2E30 NtWriteVirtualMemory,13_2_04BD2E30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2FA0 NtQuerySection,13_2_04BD2FA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2F90 NtProtectVirtualMemory,13_2_04BD2F90
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2F60 NtCreateProcessEx,13_2_04BD2F60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2AB0 NtWaitForSingleObject,13_2_04BD2AB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD2B80 NtQueryInformationFile,13_2_04BD2B80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD3090 NtSetValueKey,13_2_04BD3090
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD3010 NtOpenDirectoryObject,13_2_04BD3010
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD3D10 NtOpenProcessToken,13_2_04BD3D10
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD3D70 NtOpenThread,13_2_04BD3D70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C49680 NtReadFile,13_2_02C49680
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C49780 NtDeleteFile,13_2_02C49780
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C49510 NtCreateFile,13_2_02C49510
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C49820 NtClose,13_2_02C49820
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C49980 NtAllocateVirtualMemory,13_2_02C49980
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04A0F2CF NtReadVirtualMemory,13_2_04A0F2CF
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04A0F8C4 NtMapViewOfSection,13_2_04A0F8C4
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04FB1CF02_2_04FB1CF0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04FB1CA02_2_04FB1CA0
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A610A09_2_00A610A0
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A60AB89_2_00A60AB8
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A614889_2_00A61488
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A62E209_2_00A62E20
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A638309_2_00A63830
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A61A009_2_00A61A00
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A608489_2_00A60848
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A628489_2_00A62848
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A60AA99_2_00A60AA9
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A610919_2_00A61091
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A635F49_2_00A635F4
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A638209_2_00A63820
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A606299_2_00A60629
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A628399_2_00A62839
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A636089_2_00A63608
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A612179_2_00A61217
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A62E1B9_2_00A62E1B
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A636609_2_00A63660
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 9_2_00A614789_2_00A61478
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004188F310_2_004188F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040300010_2_00403000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004100CA10_2_004100CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0042F0D310_2_0042F0D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004100D310_2_004100D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040124010_2_00401240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040E2E310_2_0040E2E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004102F310_2_004102F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00416AFE10_2_00416AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00416B0310_2_00416B03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040246210_2_00402462
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040247010_2_00402470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040E47C10_2_0040E47C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040E42710_2_0040E427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040E43310_2_0040E433
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040275010_2_00402750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028802C010_2_028802C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A027410_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C03E610_2_028C03E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E3F010_2_0280E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BA35210_2_028BA352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289200010_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C01AA10_2_028C01AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B41A210_2_028B41A2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B81CC10_2_028B81CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F010010_2_027F0100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289A11810_2_0289A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0288815810_2_02888158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281C6E010_2_0281C6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FC7C010_2_027FC7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282475010_2_02824750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280077010_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AE4F610_2_028AE4F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A442010_2_028A4420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B244610_2_028B2446
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C059110_2_028C0591
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280053510_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA8010_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B6BD710_2_028B6BD7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BAB4010_2_028BAB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E8F010_2_0282E8F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280A84010_2_0280A840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280284010_2_02802840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E68B810_2_027E68B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A010_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028CA9A610_2_028CA9A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281696210_2_02816962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812E9010_2_02812E90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BCE9310_2_028BCE93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BEEDB10_2_028BEEDB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BEE2610_2_028BEE26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800E5910_2_02800E59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287EFA010_2_0287EFA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280CFE010_2_0280CFE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02842F2810_2_02842F28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02820F3010_2_02820F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F2FC810_2_027F2FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A2F3010_2_028A2F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02874F4010_2_02874F40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0CB510_2_028A0CB5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800C0010_2_02800C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0CF210_2_027F0CF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02818DBF10_2_02818DBF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280AD0010_2_0280AD00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289CD1F10_2_0289CD1F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FADE010_2_027FADE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028052A010_2_028052A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281B2C010_2_0281B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A12ED10_2_028A12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0284739A10_2_0284739A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027ED34C10_2_027ED34C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B132D10_2_028B132D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028070C010_2_028070C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AF0CC10_2_028AF0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B70E910_2_028B70E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BF0E010_2_028BF0E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EF17210_2_027EF172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280B1B010_2_0280B1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028CB16B10_2_028CB16B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0283516C10_2_0283516C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B16CC10_2_028B16CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0284563010_2_02845630
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BF7B010_2_028BF7B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F17EC10_2_027F17EC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F146010_2_027F1460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BF43F10_2_028BF43F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289D5B010_2_0289D5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C95C310_2_028C95C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B757110_2_028B7571
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02845AA010_2_02845AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289DAAC10_2_0289DAAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A1AA310_2_028A1AA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028ADAC610_2_028ADAC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BFA4910_2_028BFA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B7A4610_2_028B7A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02873A6C10_2_02873A6C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281FB8010_2_0281FB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02875BF010_2_02875BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0283DBF910_2_0283DBF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BFB7610_2_028BFB76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028038E010_2_028038E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286D80010_2_0286D800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289591010_2_02895910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280995010_2_02809950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281B95010_2_0281B950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02809EB010_2_02809EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02801F9210_2_02801F92
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BFFB110_2_028BFFB1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BFF0910_2_028BFF09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027C3FD510_2_027C3FD5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027C3FD210_2_027C3FD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BFCF210_2_028BFCF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02879C3210_2_02879C32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281FDC010_2_0281FDC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02803D4010_2_02803D40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B1D5A10_2_028B1D5A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B7D7310_2_028B7D73
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_042684E012_2_042684E0
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426853E12_2_0426853E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426A54E12_2_0426A54E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04270D5E12_2_04270D5E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04270D5912_2_04270D59
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426868212_2_04268682
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426868E12_2_0426868E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_042686D712_2_042686D7
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426A32512_2_0426A325
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0428932E12_2_0428932E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426A32E12_2_0426A32E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04272B4E12_2_04272B4E
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C4E4F613_2_04C4E4F6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5244613_2_04C52446
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C4442013_2_04C44420
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C6059113_2_04C60591
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA053513_2_04BA0535
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BBC6E013_2_04BBC6E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B9C7C013_2_04B9C7C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA077013_2_04BA0770
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BC475013_2_04BC4750
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C3200013_2_04C32000
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C581CC13_2_04C581CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C541A213_2_04C541A2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C601AA13_2_04C601AA
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C2815813_2_04C28158
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B9010013_2_04B90100
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C3A11813_2_04C3A118
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C202C013_2_04C202C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C4027413_2_04C40274
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C603E613_2_04C603E6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BAE3F013_2_04BAE3F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5A35213_2_04C5A352
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B90CF213_2_04B90CF2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C40CB513_2_04C40CB5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA0C0013_2_04BA0C00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BB8DBF13_2_04BB8DBF
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B9ADE013_2_04B9ADE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BAAD0013_2_04BAAD00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C3CD1F13_2_04C3CD1F
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5EEDB13_2_04C5EEDB
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BB2E9013_2_04BB2E90
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5CE9313_2_04C5CE93
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5EE2613_2_04C5EE26
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA0E5913_2_04BA0E59
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BACFE013_2_04BACFE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C1EFA013_2_04C1EFA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B92FC813_2_04B92FC8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C14F4013_2_04C14F40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BC0F3013_2_04BC0F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BE2F2813_2_04BE2F28
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C42F3013_2_04C42F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B868B813_2_04B868B8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BCE8F013_2_04BCE8F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BAA84013_2_04BAA840
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA284013_2_04BA2840
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA29A013_2_04BA29A0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C6A9A613_2_04C6A9A6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BB696213_2_04BB6962
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B9EA8013_2_04B9EA80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C56BD713_2_04C56BD7
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5AB4013_2_04C5AB40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B9146013_2_04B91460
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5F43F13_2_04C5F43F
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C695C313_2_04C695C3
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C3D5B013_2_04C3D5B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5757113_2_04C57571
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C516CC13_2_04C516CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BE563013_2_04BE5630
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B917EC13_2_04B917EC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5F7B013_2_04C5F7B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C4F0CC13_2_04C4F0CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5F0E013_2_04C5F0E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C570E913_2_04C570E9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA70C013_2_04BA70C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BAB1B013_2_04BAB1B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C6B16B13_2_04C6B16B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B8F17213_2_04B8F172
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BD516C13_2_04BD516C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA52A013_2_04BA52A0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C412ED13_2_04C412ED
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BBB2C013_2_04BBB2C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BE739A13_2_04BE739A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5132D13_2_04C5132D
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B8D34C13_2_04B8D34C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5FCF213_2_04C5FCF2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C19C3213_2_04C19C32
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BBFDC013_2_04BBFDC0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C51D5A13_2_04C51D5A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C57D7313_2_04C57D73
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA3D4013_2_04BA3D40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA9EB013_2_04BA9EB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA1F9213_2_04BA1F92
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B63FD513_2_04B63FD5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B63FD213_2_04B63FD2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5FFB113_2_04C5FFB1
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5FF0913_2_04C5FF09
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA38E013_2_04BA38E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C0D80013_2_04C0D800
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C3591013_2_04C35910
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BA995013_2_04BA9950
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BBB95013_2_04BBB950
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C4DAC613_2_04C4DAC6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BE5AA013_2_04BE5AA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C41AA313_2_04C41AA3
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C3DAAC13_2_04C3DAAC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C57A4613_2_04C57A46
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5FA4913_2_04C5FA49
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C13A6C13_2_04C13A6C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C15BF013_2_04C15BF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BBFB8013_2_04BBFB80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04BDDBF913_2_04BDDBF9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04C5FB7613_2_04C5FB76
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C31FD013_2_02C31FD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2CE4713_2_02C2CE47
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2CE5013_2_02C2CE50
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2B06013_2_02C2B060
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2D07013_2_02C2D070
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2B1F913_2_02C2B1F9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2B1A413_2_02C2B1A4
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C2B1B013_2_02C2B1B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C3567013_2_02C35670
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C3388013_2_02C33880
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C3387B13_2_02C3387B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C4BE5013_2_02C4BE50
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04A0E46713_2_04A0E467
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04A0E7FC13_2_04A0E7FC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04A0D8C813_2_04A0D8C8
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EC6DE14_2_055EC6DE
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EC6D514_2_055EC6D5
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055F4EFE14_2_055F4EFE
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_0560B6DE14_2_0560B6DE
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055F310E14_2_055F310E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055F310914_2_055F3109
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055F185E14_2_055F185E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EC8FE14_2_055EC8FE
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EA8EE14_2_055EA8EE
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EAA3E14_2_055EAA3E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EAA3214_2_055EAA32
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 14_2_055EAA8714_2_055EAA87
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0287F290 appears 105 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 027EB970 appears 283 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 02847E54 appears 109 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 02835130 appears 58 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0286EA12 appears 86 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 04C1F290 appears 105 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 04BD5130 appears 58 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 04BE7E54 appears 109 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 04B8B970 appears 283 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 04C0EA12 appears 86 times
                Source: Process Memory Space: powershell.exe PID: 8104, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: x.exe.2.dr, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
                Source: 2.2.powershell.exe.66d7ef8.0.raw.unpack, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winPS1@11/8@5/5
                Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\x.exe.logJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8112:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_raoovv0o.hum.ps1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002EE7000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2530133525.0000000002F15000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1942243174.0000000002EE7000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2530133525.0000000002EF1000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1941937311.0000000002EC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: laser.ps1Virustotal: Detection: 49%
                Source: laser.ps1ReversingLabs: Detection: 37%
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser.ps1"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\laser.ps1"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: laser.ps1Static file information: File size 1061668 > 1048576
                Source: Binary string: runonce.pdbGCTL source: RegAsm.exe, 0000000A.00000002.1749320441.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2535807080.00000000012EE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: RegAsm.exe, 0000000A.00000002.1749802100.00000000027C0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1751415139.00000000049B6000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1748918282.000000000480A000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004CFE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004B60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 0000000A.00000002.1749802100.00000000027C0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, runonce.exe, 0000000D.00000003.1751415139.00000000049B6000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1748918282.000000000480A000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004CFE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000D.00000002.2539145094.0000000004B60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: runonce.pdb source: RegAsm.exe, 0000000A.00000002.1749320441.0000000000ACA000.00000004.00000020.00020000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2535807080.00000000012EE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: CXDFGDF.pdb source: powershell.exe, 00000002.00000002.1302140636.000000000668F000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000009.00000000.1292172273.0000000000242000.00000002.00000001.01000000.0000000A.sdmp, x.exe.2.dr
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000000.1672162976.000000000040F000.00000002.00000001.01000000.0000000B.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000000.1817091071.000000000040F000.00000002.00000001.01000000.0000000B.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAN
                Source: x.exe.2.drStatic PE information: 0x9B7D60DE [Sat Aug 31 02:47:58 2052 UTC]
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04FB29FA push eax; ret 2_2_04FB2A29
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0041F04F push ebx; ret 10_2_0041F058
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00403280 push eax; ret 10_2_00403282
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0041AB61 pushfd ; ret 10_2_0041AB78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0041ABD6 push ds; ret 10_2_0041ABD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0040D38A push edx; iretd 10_2_0040D453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00426CC3 pushad ; iretd 10_2_00426CEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004084DA push esi; retf 10_2_004084DD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004084FF push ebp; iretd 10_2_00408502
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00412559 push ecx; iretd 10_2_0041255A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_004125DC pushfd ; iretd 10_2_004125FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00413E59 push 2C1D344Fh; ret 10_2_00413E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00405E25 push ecx; ret 10_2_00405E2B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00401F0E push ss; retf 10_2_00401F14
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027C225F pushad ; ret 10_2_027C27F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027C27FA pushad ; ret 10_2_027C27F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027C283D push eax; iretd 10_2_027C2858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F09AD push ecx; mov dword ptr [esp], ecx10_2_027F09B6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027C1200 push eax; iretd 10_2_027C1369
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04274DBC pushfd ; ret 12_2_04274DD3
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_042675E5 push edx; iretd 12_2_042676AE
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04274E31 push ds; ret 12_2_04274E33
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04262735 push esi; retf 12_2_04262738
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04280F1E pushad ; iretd 12_2_04280F46
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04270742 push eax; ret 12_2_0427074E
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426275A push ebp; iretd 12_2_0426275D
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426C7B4 push ecx; iretd 12_2_0426C7B5
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426C837 pushfd ; iretd 12_2_0426C856
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_0426E0B4 push 2C1D344Fh; ret 12_2_0426E0BB
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeCode function: 12_2_04260080 push ecx; ret 12_2_04260086
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_04B627FA pushad ; ret 13_2_04B627F9
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8104, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CD324
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CD7E4
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CD944
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CD504
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CD544
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CD1E4
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418D0154
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FF8418CDA44
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2450000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0283096E rdtsc 10_2_0283096E
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3137Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeWindow / User API: threadDelayed 9784Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\runonce.exeAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5904Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 1056Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 7284Thread sleep count: 188 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 7284Thread sleep time: -376000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 7284Thread sleep count: 9784 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 7284Thread sleep time: -19568000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exe TID: 7472Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\runonce.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 13_2_02C3C8D0 FindFirstFileW,FindNextFileW,FindClose,13_2_02C3C8D0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                Source: 6511-iOQ--.13.drBinary or memory string: tasks.office.comVMware20,11696501413o
                Source: 6511-iOQ--.13.drBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                Source: powershell.exe, 00000002.00000002.1302140636.0000000006079000.00000004.00000800.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1761114470.0000000004AB0000.00000004.00000800.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1763572689.0000000004AB0000.00000004.00000800.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1819180645.0000000004AB0000.00000004.00000800.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1756307655.0000000002FE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1qEmuSW3rOVU9h0g7a9n.exex
                Source: 6511-iOQ--.13.drBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                Source: 6511-iOQ--.13.drBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                Source: 6511-iOQ--.13.drBinary or memory string: dev.azure.comVMware20,11696501413j
                Source: runonce.exe, 0000000D.00000002.2542392067.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.comVMware20,1169650#
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                Source: 6511-iOQ--.13.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                Source: 6511-iOQ--.13.drBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                Source: 6511-iOQ--.13.drBinary or memory string: bankofamerica.comVMware20,11696501413x
                Source: 6511-iOQ--.13.drBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                Source: runonce.exe, 0000000D.00000002.2542392067.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactiveuserers.co.inVMware20,11696501413~
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                Source: runonce.exe, 0000000D.00000002.2542392067.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,1169650141
                Source: 6511-iOQ--.13.drBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                Source: 6511-iOQ--.13.drBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                Source: runonce.exe, 0000000D.00000002.2530133525.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.2061765313.00000216E817C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: runonce.exe, 0000000D.00000002.2542392067.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: saction PasswordVMware20,11696501413^
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - HKVMware20,11696501413]
                Source: 6511-iOQ--.13.drBinary or memory string: outlook.office.comVMware20,11696501413s
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                Source: runonce.exe, 0000000D.00000002.2542392067.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696Y
                Source: 6511-iOQ--.13.drBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                Source: 6511-iOQ--.13.drBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                Source: runonce.exe, 0000000D.00000003.1756736081.0000000004801000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000D.00000003.1766357987.0000000004801000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1qEmuSW3rOVU9h0g7a9n.exe
                Source: 6511-iOQ--.13.drBinary or memory string: ms.portal.azure.comVMware20,11696501413
                Source: 6511-iOQ--.13.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                Source: 6511-iOQ--.13.drBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                Source: 6511-iOQ--.13.drBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                Source: 6511-iOQ--.13.drBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                Source: 6511-iOQ--.13.drBinary or memory string: outlook.office365.comVMware20,11696501413t
                Source: 6511-iOQ--.13.drBinary or memory string: global block list test formVMware20,11696501413
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000002.2537936236.0000000001209000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                Source: 6511-iOQ--.13.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                Source: 6511-iOQ--.13.drBinary or memory string: interactiveuserers.comVMware20,11696501413
                Source: runonce.exe, 0000000D.00000002.2542392067.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,116965
                Source: 6511-iOQ--.13.drBinary or memory string: discord.comVMware20,11696501413f
                Source: 6511-iOQ--.13.drBinary or memory string: AMC password management pageVMware20,11696501413
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0283096E rdtsc 10_2_0283096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_00417A93 LdrLoadDll,10_2_00417A93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02870283 mov eax, dword ptr fs:[00000030h]10_2_02870283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02870283 mov eax, dword ptr fs:[00000030h]10_2_02870283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02870283 mov eax, dword ptr fs:[00000030h]10_2_02870283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E284 mov eax, dword ptr fs:[00000030h]10_2_0282E284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E284 mov eax, dword ptr fs:[00000030h]10_2_0282E284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E826B mov eax, dword ptr fs:[00000030h]10_2_027E826B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4260 mov eax, dword ptr fs:[00000030h]10_2_027F4260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4260 mov eax, dword ptr fs:[00000030h]10_2_027F4260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4260 mov eax, dword ptr fs:[00000030h]10_2_027F4260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028002A0 mov eax, dword ptr fs:[00000030h]10_2_028002A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028002A0 mov eax, dword ptr fs:[00000030h]10_2_028002A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6259 mov eax, dword ptr fs:[00000030h]10_2_027F6259
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028862A0 mov eax, dword ptr fs:[00000030h]10_2_028862A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028862A0 mov ecx, dword ptr fs:[00000030h]10_2_028862A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028862A0 mov eax, dword ptr fs:[00000030h]10_2_028862A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028862A0 mov eax, dword ptr fs:[00000030h]10_2_028862A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028862A0 mov eax, dword ptr fs:[00000030h]10_2_028862A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028862A0 mov eax, dword ptr fs:[00000030h]10_2_028862A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EA250 mov eax, dword ptr fs:[00000030h]10_2_027EA250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E823B mov eax, dword ptr fs:[00000030h]10_2_027E823B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C62D6 mov eax, dword ptr fs:[00000030h]10_2_028C62D6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028002E1 mov eax, dword ptr fs:[00000030h]10_2_028002E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028002E1 mov eax, dword ptr fs:[00000030h]10_2_028002E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028002E1 mov eax, dword ptr fs:[00000030h]10_2_028002E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA2C3 mov eax, dword ptr fs:[00000030h]10_2_027FA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA2C3 mov eax, dword ptr fs:[00000030h]10_2_027FA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA2C3 mov eax, dword ptr fs:[00000030h]10_2_027FA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA2C3 mov eax, dword ptr fs:[00000030h]10_2_027FA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA2C3 mov eax, dword ptr fs:[00000030h]10_2_027FA2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02878243 mov eax, dword ptr fs:[00000030h]10_2_02878243
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02878243 mov ecx, dword ptr fs:[00000030h]10_2_02878243
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C625D mov eax, dword ptr fs:[00000030h]10_2_028C625D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AA250 mov eax, dword ptr fs:[00000030h]10_2_028AA250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AA250 mov eax, dword ptr fs:[00000030h]10_2_028AA250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A0274 mov eax, dword ptr fs:[00000030h]10_2_028A0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281438F mov eax, dword ptr fs:[00000030h]10_2_0281438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281438F mov eax, dword ptr fs:[00000030h]10_2_0281438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AC3CD mov eax, dword ptr fs:[00000030h]10_2_028AC3CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E3DB mov eax, dword ptr fs:[00000030h]10_2_0289E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E3DB mov eax, dword ptr fs:[00000030h]10_2_0289E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E3DB mov ecx, dword ptr fs:[00000030h]10_2_0289E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E3DB mov eax, dword ptr fs:[00000030h]10_2_0289E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028943D4 mov eax, dword ptr fs:[00000030h]10_2_028943D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028943D4 mov eax, dword ptr fs:[00000030h]10_2_028943D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028003E9 mov eax, dword ptr fs:[00000030h]10_2_028003E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EC310 mov ecx, dword ptr fs:[00000030h]10_2_027EC310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E3F0 mov eax, dword ptr fs:[00000030h]10_2_0280E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E3F0 mov eax, dword ptr fs:[00000030h]10_2_0280E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E3F0 mov eax, dword ptr fs:[00000030h]10_2_0280E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028263FF mov eax, dword ptr fs:[00000030h]10_2_028263FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A30B mov eax, dword ptr fs:[00000030h]10_2_0282A30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A30B mov eax, dword ptr fs:[00000030h]10_2_0282A30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A30B mov eax, dword ptr fs:[00000030h]10_2_0282A30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02810310 mov ecx, dword ptr fs:[00000030h]10_2_02810310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C8324 mov eax, dword ptr fs:[00000030h]10_2_028C8324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C8324 mov ecx, dword ptr fs:[00000030h]10_2_028C8324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C8324 mov eax, dword ptr fs:[00000030h]10_2_028C8324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C8324 mov eax, dword ptr fs:[00000030h]10_2_028C8324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA3C0 mov eax, dword ptr fs:[00000030h]10_2_027FA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA3C0 mov eax, dword ptr fs:[00000030h]10_2_027FA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA3C0 mov eax, dword ptr fs:[00000030h]10_2_027FA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA3C0 mov eax, dword ptr fs:[00000030h]10_2_027FA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA3C0 mov eax, dword ptr fs:[00000030h]10_2_027FA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA3C0 mov eax, dword ptr fs:[00000030h]10_2_027FA3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F83C0 mov eax, dword ptr fs:[00000030h]10_2_027F83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F83C0 mov eax, dword ptr fs:[00000030h]10_2_027F83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F83C0 mov eax, dword ptr fs:[00000030h]10_2_027F83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F83C0 mov eax, dword ptr fs:[00000030h]10_2_027F83C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C634F mov eax, dword ptr fs:[00000030h]10_2_028C634F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02872349 mov eax, dword ptr fs:[00000030h]10_2_02872349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BA352 mov eax, dword ptr fs:[00000030h]10_2_028BA352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02898350 mov ecx, dword ptr fs:[00000030h]10_2_02898350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287035C mov eax, dword ptr fs:[00000030h]10_2_0287035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287035C mov eax, dword ptr fs:[00000030h]10_2_0287035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287035C mov eax, dword ptr fs:[00000030h]10_2_0287035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287035C mov ecx, dword ptr fs:[00000030h]10_2_0287035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287035C mov eax, dword ptr fs:[00000030h]10_2_0287035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287035C mov eax, dword ptr fs:[00000030h]10_2_0287035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E8397 mov eax, dword ptr fs:[00000030h]10_2_027E8397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E8397 mov eax, dword ptr fs:[00000030h]10_2_027E8397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E8397 mov eax, dword ptr fs:[00000030h]10_2_027E8397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289437C mov eax, dword ptr fs:[00000030h]10_2_0289437C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EE388 mov eax, dword ptr fs:[00000030h]10_2_027EE388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EE388 mov eax, dword ptr fs:[00000030h]10_2_027EE388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EE388 mov eax, dword ptr fs:[00000030h]10_2_027EE388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028880A8 mov eax, dword ptr fs:[00000030h]10_2_028880A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F2050 mov eax, dword ptr fs:[00000030h]10_2_027F2050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B60B8 mov eax, dword ptr fs:[00000030h]10_2_028B60B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B60B8 mov ecx, dword ptr fs:[00000030h]10_2_028B60B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028720DE mov eax, dword ptr fs:[00000030h]10_2_028720DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EA020 mov eax, dword ptr fs:[00000030h]10_2_027EA020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EC020 mov eax, dword ptr fs:[00000030h]10_2_027EC020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028760E0 mov eax, dword ptr fs:[00000030h]10_2_028760E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028320F0 mov ecx, dword ptr fs:[00000030h]10_2_028320F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02874000 mov ecx, dword ptr fs:[00000030h]10_2_02874000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02892000 mov eax, dword ptr fs:[00000030h]10_2_02892000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EC0F0 mov eax, dword ptr fs:[00000030h]10_2_027EC0F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E016 mov eax, dword ptr fs:[00000030h]10_2_0280E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E016 mov eax, dword ptr fs:[00000030h]10_2_0280E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E016 mov eax, dword ptr fs:[00000030h]10_2_0280E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E016 mov eax, dword ptr fs:[00000030h]10_2_0280E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F80E9 mov eax, dword ptr fs:[00000030h]10_2_027F80E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EA0E3 mov ecx, dword ptr fs:[00000030h]10_2_027EA0E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02886030 mov eax, dword ptr fs:[00000030h]10_2_02886030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876050 mov eax, dword ptr fs:[00000030h]10_2_02876050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E80A0 mov eax, dword ptr fs:[00000030h]10_2_027E80A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281C073 mov eax, dword ptr fs:[00000030h]10_2_0281C073
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F208A mov eax, dword ptr fs:[00000030h]10_2_027F208A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AC188 mov eax, dword ptr fs:[00000030h]10_2_028AC188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AC188 mov eax, dword ptr fs:[00000030h]10_2_028AC188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02830185 mov eax, dword ptr fs:[00000030h]10_2_02830185
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02894180 mov eax, dword ptr fs:[00000030h]10_2_02894180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02894180 mov eax, dword ptr fs:[00000030h]10_2_02894180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287019F mov eax, dword ptr fs:[00000030h]10_2_0287019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287019F mov eax, dword ptr fs:[00000030h]10_2_0287019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287019F mov eax, dword ptr fs:[00000030h]10_2_0287019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287019F mov eax, dword ptr fs:[00000030h]10_2_0287019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EC156 mov eax, dword ptr fs:[00000030h]10_2_027EC156
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6154 mov eax, dword ptr fs:[00000030h]10_2_027F6154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6154 mov eax, dword ptr fs:[00000030h]10_2_027F6154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B61C3 mov eax, dword ptr fs:[00000030h]10_2_028B61C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B61C3 mov eax, dword ptr fs:[00000030h]10_2_028B61C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E1D0 mov eax, dword ptr fs:[00000030h]10_2_0286E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E1D0 mov eax, dword ptr fs:[00000030h]10_2_0286E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E1D0 mov ecx, dword ptr fs:[00000030h]10_2_0286E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E1D0 mov eax, dword ptr fs:[00000030h]10_2_0286E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E1D0 mov eax, dword ptr fs:[00000030h]10_2_0286E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C61E5 mov eax, dword ptr fs:[00000030h]10_2_028C61E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028201F8 mov eax, dword ptr fs:[00000030h]10_2_028201F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov eax, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov ecx, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov eax, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov eax, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov ecx, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov eax, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov eax, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov ecx, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov eax, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289E10E mov ecx, dword ptr fs:[00000030h]10_2_0289E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289A118 mov ecx, dword ptr fs:[00000030h]10_2_0289A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289A118 mov eax, dword ptr fs:[00000030h]10_2_0289A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289A118 mov eax, dword ptr fs:[00000030h]10_2_0289A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289A118 mov eax, dword ptr fs:[00000030h]10_2_0289A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B0115 mov eax, dword ptr fs:[00000030h]10_2_028B0115
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02820124 mov eax, dword ptr fs:[00000030h]10_2_02820124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02884144 mov eax, dword ptr fs:[00000030h]10_2_02884144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02884144 mov eax, dword ptr fs:[00000030h]10_2_02884144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02884144 mov ecx, dword ptr fs:[00000030h]10_2_02884144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02884144 mov eax, dword ptr fs:[00000030h]10_2_02884144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02884144 mov eax, dword ptr fs:[00000030h]10_2_02884144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02888158 mov eax, dword ptr fs:[00000030h]10_2_02888158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4164 mov eax, dword ptr fs:[00000030h]10_2_028C4164
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4164 mov eax, dword ptr fs:[00000030h]10_2_028C4164
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EA197 mov eax, dword ptr fs:[00000030h]10_2_027EA197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EA197 mov eax, dword ptr fs:[00000030h]10_2_027EA197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EA197 mov eax, dword ptr fs:[00000030h]10_2_027EA197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C6A6 mov eax, dword ptr fs:[00000030h]10_2_0282C6A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028266B0 mov eax, dword ptr fs:[00000030h]10_2_028266B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A6C7 mov ebx, dword ptr fs:[00000030h]10_2_0282A6C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A6C7 mov eax, dword ptr fs:[00000030h]10_2_0282A6C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F262C mov eax, dword ptr fs:[00000030h]10_2_027F262C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E6F2 mov eax, dword ptr fs:[00000030h]10_2_0286E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E6F2 mov eax, dword ptr fs:[00000030h]10_2_0286E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E6F2 mov eax, dword ptr fs:[00000030h]10_2_0286E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E6F2 mov eax, dword ptr fs:[00000030h]10_2_0286E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028706F1 mov eax, dword ptr fs:[00000030h]10_2_028706F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028706F1 mov eax, dword ptr fs:[00000030h]10_2_028706F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280260B mov eax, dword ptr fs:[00000030h]10_2_0280260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E609 mov eax, dword ptr fs:[00000030h]10_2_0286E609
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832619 mov eax, dword ptr fs:[00000030h]10_2_02832619
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02826620 mov eax, dword ptr fs:[00000030h]10_2_02826620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02828620 mov eax, dword ptr fs:[00000030h]10_2_02828620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280E627 mov eax, dword ptr fs:[00000030h]10_2_0280E627
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0280C640 mov eax, dword ptr fs:[00000030h]10_2_0280C640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A660 mov eax, dword ptr fs:[00000030h]10_2_0282A660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A660 mov eax, dword ptr fs:[00000030h]10_2_0282A660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B866E mov eax, dword ptr fs:[00000030h]10_2_028B866E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B866E mov eax, dword ptr fs:[00000030h]10_2_028B866E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4690 mov eax, dword ptr fs:[00000030h]10_2_027F4690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4690 mov eax, dword ptr fs:[00000030h]10_2_027F4690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02822674 mov eax, dword ptr fs:[00000030h]10_2_02822674
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289678E mov eax, dword ptr fs:[00000030h]10_2_0289678E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8770 mov eax, dword ptr fs:[00000030h]10_2_027F8770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A47A0 mov eax, dword ptr fs:[00000030h]10_2_028A47A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0750 mov eax, dword ptr fs:[00000030h]10_2_027F0750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028707C3 mov eax, dword ptr fs:[00000030h]10_2_028707C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287E7E1 mov eax, dword ptr fs:[00000030h]10_2_0287E7E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028127ED mov eax, dword ptr fs:[00000030h]10_2_028127ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028127ED mov eax, dword ptr fs:[00000030h]10_2_028127ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028127ED mov eax, dword ptr fs:[00000030h]10_2_028127ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0710 mov eax, dword ptr fs:[00000030h]10_2_027F0710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C700 mov eax, dword ptr fs:[00000030h]10_2_0282C700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F47FB mov eax, dword ptr fs:[00000030h]10_2_027F47FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F47FB mov eax, dword ptr fs:[00000030h]10_2_027F47FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02820710 mov eax, dword ptr fs:[00000030h]10_2_02820710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C720 mov eax, dword ptr fs:[00000030h]10_2_0282C720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C720 mov eax, dword ptr fs:[00000030h]10_2_0282C720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286C730 mov eax, dword ptr fs:[00000030h]10_2_0286C730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282273C mov eax, dword ptr fs:[00000030h]10_2_0282273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282273C mov ecx, dword ptr fs:[00000030h]10_2_0282273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282273C mov eax, dword ptr fs:[00000030h]10_2_0282273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FC7C0 mov eax, dword ptr fs:[00000030h]10_2_027FC7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282674D mov esi, dword ptr fs:[00000030h]10_2_0282674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282674D mov eax, dword ptr fs:[00000030h]10_2_0282674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282674D mov eax, dword ptr fs:[00000030h]10_2_0282674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F07AF mov eax, dword ptr fs:[00000030h]10_2_027F07AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02874755 mov eax, dword ptr fs:[00000030h]10_2_02874755
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832750 mov eax, dword ptr fs:[00000030h]10_2_02832750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02832750 mov eax, dword ptr fs:[00000030h]10_2_02832750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287E75D mov eax, dword ptr fs:[00000030h]10_2_0287E75D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800770 mov eax, dword ptr fs:[00000030h]10_2_02800770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AA49A mov eax, dword ptr fs:[00000030h]10_2_028AA49A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E645D mov eax, dword ptr fs:[00000030h]10_2_027E645D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028244B0 mov ecx, dword ptr fs:[00000030h]10_2_028244B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287A4B0 mov eax, dword ptr fs:[00000030h]10_2_0287A4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EC427 mov eax, dword ptr fs:[00000030h]10_2_027EC427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EE420 mov eax, dword ptr fs:[00000030h]10_2_027EE420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EE420 mov eax, dword ptr fs:[00000030h]10_2_027EE420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027EE420 mov eax, dword ptr fs:[00000030h]10_2_027EE420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02828402 mov eax, dword ptr fs:[00000030h]10_2_02828402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02828402 mov eax, dword ptr fs:[00000030h]10_2_02828402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02828402 mov eax, dword ptr fs:[00000030h]10_2_02828402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F04E5 mov ecx, dword ptr fs:[00000030h]10_2_027F04E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02876420 mov eax, dword ptr fs:[00000030h]10_2_02876420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A430 mov eax, dword ptr fs:[00000030h]10_2_0282A430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E443 mov eax, dword ptr fs:[00000030h]10_2_0282E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F64AB mov eax, dword ptr fs:[00000030h]10_2_027F64AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281245A mov eax, dword ptr fs:[00000030h]10_2_0281245A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028AA456 mov eax, dword ptr fs:[00000030h]10_2_028AA456
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287C460 mov ecx, dword ptr fs:[00000030h]10_2_0287C460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281A470 mov eax, dword ptr fs:[00000030h]10_2_0281A470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281A470 mov eax, dword ptr fs:[00000030h]10_2_0281A470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281A470 mov eax, dword ptr fs:[00000030h]10_2_0281A470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02824588 mov eax, dword ptr fs:[00000030h]10_2_02824588
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E59C mov eax, dword ptr fs:[00000030h]10_2_0282E59C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028705A7 mov eax, dword ptr fs:[00000030h]10_2_028705A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028705A7 mov eax, dword ptr fs:[00000030h]10_2_028705A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028705A7 mov eax, dword ptr fs:[00000030h]10_2_028705A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8550 mov eax, dword ptr fs:[00000030h]10_2_027F8550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8550 mov eax, dword ptr fs:[00000030h]10_2_027F8550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028145B1 mov eax, dword ptr fs:[00000030h]10_2_028145B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028145B1 mov eax, dword ptr fs:[00000030h]10_2_028145B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E5CF mov eax, dword ptr fs:[00000030h]10_2_0282E5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282E5CF mov eax, dword ptr fs:[00000030h]10_2_0282E5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A5D0 mov eax, dword ptr fs:[00000030h]10_2_0282A5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A5D0 mov eax, dword ptr fs:[00000030h]10_2_0282A5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E5E7 mov eax, dword ptr fs:[00000030h]10_2_0281E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C5ED mov eax, dword ptr fs:[00000030h]10_2_0282C5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C5ED mov eax, dword ptr fs:[00000030h]10_2_0282C5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02886500 mov eax, dword ptr fs:[00000030h]10_2_02886500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4500 mov eax, dword ptr fs:[00000030h]10_2_028C4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F25E0 mov eax, dword ptr fs:[00000030h]10_2_027F25E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F65D0 mov eax, dword ptr fs:[00000030h]10_2_027F65D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800535 mov eax, dword ptr fs:[00000030h]10_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800535 mov eax, dword ptr fs:[00000030h]10_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800535 mov eax, dword ptr fs:[00000030h]10_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800535 mov eax, dword ptr fs:[00000030h]10_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800535 mov eax, dword ptr fs:[00000030h]10_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800535 mov eax, dword ptr fs:[00000030h]10_2_02800535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E53E mov eax, dword ptr fs:[00000030h]10_2_0281E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E53E mov eax, dword ptr fs:[00000030h]10_2_0281E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E53E mov eax, dword ptr fs:[00000030h]10_2_0281E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E53E mov eax, dword ptr fs:[00000030h]10_2_0281E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E53E mov eax, dword ptr fs:[00000030h]10_2_0281E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282656A mov eax, dword ptr fs:[00000030h]10_2_0282656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282656A mov eax, dword ptr fs:[00000030h]10_2_0282656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282656A mov eax, dword ptr fs:[00000030h]10_2_0282656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F2582 mov eax, dword ptr fs:[00000030h]10_2_027F2582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F2582 mov ecx, dword ptr fs:[00000030h]10_2_027F2582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4A80 mov eax, dword ptr fs:[00000030h]10_2_028C4A80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02828A90 mov edx, dword ptr fs:[00000030h]10_2_02828A90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02846AA4 mov eax, dword ptr fs:[00000030h]10_2_02846AA4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F6A50 mov eax, dword ptr fs:[00000030h]10_2_027F6A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02846ACC mov eax, dword ptr fs:[00000030h]10_2_02846ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02846ACC mov eax, dword ptr fs:[00000030h]10_2_02846ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02846ACC mov eax, dword ptr fs:[00000030h]10_2_02846ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02824AD0 mov eax, dword ptr fs:[00000030h]10_2_02824AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02824AD0 mov eax, dword ptr fs:[00000030h]10_2_02824AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282AAEE mov eax, dword ptr fs:[00000030h]10_2_0282AAEE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282AAEE mov eax, dword ptr fs:[00000030h]10_2_0282AAEE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287CA11 mov eax, dword ptr fs:[00000030h]10_2_0287CA11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282CA24 mov eax, dword ptr fs:[00000030h]10_2_0282CA24
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281EA2E mov eax, dword ptr fs:[00000030h]10_2_0281EA2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0AD0 mov eax, dword ptr fs:[00000030h]10_2_027F0AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02814A35 mov eax, dword ptr fs:[00000030h]10_2_02814A35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02814A35 mov eax, dword ptr fs:[00000030h]10_2_02814A35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282CA38 mov eax, dword ptr fs:[00000030h]10_2_0282CA38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800A5B mov eax, dword ptr fs:[00000030h]10_2_02800A5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800A5B mov eax, dword ptr fs:[00000030h]10_2_02800A5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8AA0 mov eax, dword ptr fs:[00000030h]10_2_027F8AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8AA0 mov eax, dword ptr fs:[00000030h]10_2_027F8AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289EA60 mov eax, dword ptr fs:[00000030h]10_2_0289EA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282CA6F mov eax, dword ptr fs:[00000030h]10_2_0282CA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282CA6F mov eax, dword ptr fs:[00000030h]10_2_0282CA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282CA6F mov eax, dword ptr fs:[00000030h]10_2_0282CA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286CA72 mov eax, dword ptr fs:[00000030h]10_2_0286CA72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286CA72 mov eax, dword ptr fs:[00000030h]10_2_0286CA72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FEA80 mov eax, dword ptr fs:[00000030h]10_2_027FEA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027ECB7E mov eax, dword ptr fs:[00000030h]10_2_027ECB7E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E8B50 mov eax, dword ptr fs:[00000030h]10_2_027E8B50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A4BB0 mov eax, dword ptr fs:[00000030h]10_2_028A4BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A4BB0 mov eax, dword ptr fs:[00000030h]10_2_028A4BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800BBE mov eax, dword ptr fs:[00000030h]10_2_02800BBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02800BBE mov eax, dword ptr fs:[00000030h]10_2_02800BBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02810BCB mov eax, dword ptr fs:[00000030h]10_2_02810BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02810BCB mov eax, dword ptr fs:[00000030h]10_2_02810BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02810BCB mov eax, dword ptr fs:[00000030h]10_2_02810BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289EBD0 mov eax, dword ptr fs:[00000030h]10_2_0289EBD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287CBF0 mov eax, dword ptr fs:[00000030h]10_2_0287CBF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281EBFC mov eax, dword ptr fs:[00000030h]10_2_0281EBFC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4B00 mov eax, dword ptr fs:[00000030h]10_2_028C4B00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8BF0 mov eax, dword ptr fs:[00000030h]10_2_027F8BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8BF0 mov eax, dword ptr fs:[00000030h]10_2_027F8BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F8BF0 mov eax, dword ptr fs:[00000030h]10_2_027F8BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286EB1D mov eax, dword ptr fs:[00000030h]10_2_0286EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281EB20 mov eax, dword ptr fs:[00000030h]10_2_0281EB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281EB20 mov eax, dword ptr fs:[00000030h]10_2_0281EB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B8B28 mov eax, dword ptr fs:[00000030h]10_2_028B8B28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028B8B28 mov eax, dword ptr fs:[00000030h]10_2_028B8B28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0BCD mov eax, dword ptr fs:[00000030h]10_2_027F0BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0BCD mov eax, dword ptr fs:[00000030h]10_2_027F0BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0BCD mov eax, dword ptr fs:[00000030h]10_2_027F0BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A4B4B mov eax, dword ptr fs:[00000030h]10_2_028A4B4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028A4B4B mov eax, dword ptr fs:[00000030h]10_2_028A4B4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02886B40 mov eax, dword ptr fs:[00000030h]10_2_02886B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02886B40 mov eax, dword ptr fs:[00000030h]10_2_02886B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02898B42 mov eax, dword ptr fs:[00000030h]10_2_02898B42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BAB40 mov eax, dword ptr fs:[00000030h]10_2_028BAB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289EB50 mov eax, dword ptr fs:[00000030h]10_2_0289EB50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C2B57 mov eax, dword ptr fs:[00000030h]10_2_028C2B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C2B57 mov eax, dword ptr fs:[00000030h]10_2_028C2B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C2B57 mov eax, dword ptr fs:[00000030h]10_2_028C2B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C2B57 mov eax, dword ptr fs:[00000030h]10_2_028C2B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287C89D mov eax, dword ptr fs:[00000030h]10_2_0287C89D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4859 mov eax, dword ptr fs:[00000030h]10_2_027F4859
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F4859 mov eax, dword ptr fs:[00000030h]10_2_027F4859
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0281E8C0 mov eax, dword ptr fs:[00000030h]10_2_0281E8C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C08C0 mov eax, dword ptr fs:[00000030h]10_2_028C08C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BA8E4 mov eax, dword ptr fs:[00000030h]10_2_028BA8E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C8F9 mov eax, dword ptr fs:[00000030h]10_2_0282C8F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282C8F9 mov eax, dword ptr fs:[00000030h]10_2_0282C8F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287C810 mov eax, dword ptr fs:[00000030h]10_2_0287C810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0282A830 mov eax, dword ptr fs:[00000030h]10_2_0282A830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289483A mov eax, dword ptr fs:[00000030h]10_2_0289483A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0289483A mov eax, dword ptr fs:[00000030h]10_2_0289483A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812835 mov eax, dword ptr fs:[00000030h]10_2_02812835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812835 mov eax, dword ptr fs:[00000030h]10_2_02812835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812835 mov eax, dword ptr fs:[00000030h]10_2_02812835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812835 mov ecx, dword ptr fs:[00000030h]10_2_02812835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812835 mov eax, dword ptr fs:[00000030h]10_2_02812835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02812835 mov eax, dword ptr fs:[00000030h]10_2_02812835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02802840 mov ecx, dword ptr fs:[00000030h]10_2_02802840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02820854 mov eax, dword ptr fs:[00000030h]10_2_02820854
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287E872 mov eax, dword ptr fs:[00000030h]10_2_0287E872
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287E872 mov eax, dword ptr fs:[00000030h]10_2_0287E872
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02886870 mov eax, dword ptr fs:[00000030h]10_2_02886870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02886870 mov eax, dword ptr fs:[00000030h]10_2_02886870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F0887 mov eax, dword ptr fs:[00000030h]10_2_027F0887
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028029A0 mov eax, dword ptr fs:[00000030h]10_2_028029A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028789B3 mov esi, dword ptr fs:[00000030h]10_2_028789B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028789B3 mov eax, dword ptr fs:[00000030h]10_2_028789B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028789B3 mov eax, dword ptr fs:[00000030h]10_2_028789B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028869C0 mov eax, dword ptr fs:[00000030h]10_2_028869C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028249D0 mov eax, dword ptr fs:[00000030h]10_2_028249D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028BA9D3 mov eax, dword ptr fs:[00000030h]10_2_028BA9D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E8918 mov eax, dword ptr fs:[00000030h]10_2_027E8918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027E8918 mov eax, dword ptr fs:[00000030h]10_2_027E8918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287E9E0 mov eax, dword ptr fs:[00000030h]10_2_0287E9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028229F9 mov eax, dword ptr fs:[00000030h]10_2_028229F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028229F9 mov eax, dword ptr fs:[00000030h]10_2_028229F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E908 mov eax, dword ptr fs:[00000030h]10_2_0286E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0286E908 mov eax, dword ptr fs:[00000030h]10_2_0286E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287C912 mov eax, dword ptr fs:[00000030h]10_2_0287C912
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0288892B mov eax, dword ptr fs:[00000030h]10_2_0288892B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_0287892A mov eax, dword ptr fs:[00000030h]10_2_0287892A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA9D0 mov eax, dword ptr fs:[00000030h]10_2_027FA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA9D0 mov eax, dword ptr fs:[00000030h]10_2_027FA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA9D0 mov eax, dword ptr fs:[00000030h]10_2_027FA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA9D0 mov eax, dword ptr fs:[00000030h]10_2_027FA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA9D0 mov eax, dword ptr fs:[00000030h]10_2_027FA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027FA9D0 mov eax, dword ptr fs:[00000030h]10_2_027FA9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_02870946 mov eax, dword ptr fs:[00000030h]10_2_02870946
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_028C4940 mov eax, dword ptr fs:[00000030h]10_2_028C4940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 10_2_027F09AD mov eax, dword ptr fs:[00000030h]10_2_027F09AD
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtOpenKeyEx: Direct from: 0x77672B9CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtProtectVirtualMemory: Direct from: 0x77672F9CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtCreateFile: Direct from: 0x77672FECJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtOpenFile: Direct from: 0x77672DCCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtTerminateThread: Direct from: 0x77672FCCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtProtectVirtualMemory: Direct from: 0x77667B2EJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtQueryInformationToken: Direct from: 0x77672CACJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtAllocateVirtualMemory: Direct from: 0x77672BECJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtDeviceIoControlFile: Direct from: 0x77672AECJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtQuerySystemInformation: Direct from: 0x776748CCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtQueryAttributesFile: Direct from: 0x77672E6CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtSetInformationThread: Direct from: 0x77672B4CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtOpenSection: Direct from: 0x77672E0CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtQueryVolumeInformationFile: Direct from: 0x77672F2CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtAllocateVirtualMemory: Direct from: 0x776748ECJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtSetInformationThread: Direct from: 0x776663F9Jump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtReadVirtualMemory: Direct from: 0x77672E8CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtCreateKey: Direct from: 0x77672C6CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtClose: Direct from: 0x77672B6C
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtWriteVirtualMemory: Direct from: 0x7767490CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtAllocateVirtualMemory: Direct from: 0x77673C9CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtDelayExecution: Direct from: 0x77672DDCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtCreateUserProcess: Direct from: 0x7767371CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtQuerySystemInformation: Direct from: 0x77672DFCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtQueryInformationProcess: Direct from: 0x77672C26Jump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtResumeThread: Direct from: 0x77672FBCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtReadFile: Direct from: 0x77672ADCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtAllocateVirtualMemory: Direct from: 0x77672BFCJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtResumeThread: Direct from: 0x776736ACJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtSetInformationProcess: Direct from: 0x77672C5CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtMapViewOfSection: Direct from: 0x77672D1CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtNotifyChangeKey: Direct from: 0x77673C2CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtWriteVirtualMemory: Direct from: 0x77672E3CJump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeNtCreateMutant: Direct from: 0x776735CCJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\SysWOW64\runonce.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeThread register set: target process: 6972Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeThread APC queued: target process: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 6E4008Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files (x86)\WhiMwXmGItPQRKbWlsStqecYVYIXRECtRvyiPPSYeyauMmGwYEHcDxGvjeeMsZMqiDql\UmhFZco3dB3hLZpEx5uvm.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2537368259.0000000001771000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000000.1672771134.0000000001770000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000000.1817552470.0000000001770000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2537368259.0000000001771000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000000.1672771134.0000000001770000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000000.1817552470.0000000001770000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2537368259.0000000001771000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000000.1672771134.0000000001770000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000000.1817552470.0000000001770000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Manager
                Source: UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000002.2537368259.0000000001771000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000C.00000000.1672771134.0000000001770000.00000002.00000001.00040000.00000000.sdmp, UmhFZco3dB3hLZpEx5uvm.exe, 0000000E.00000000.1817552470.0000000001770000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\laser.ps1 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.1752374705.0000000003F10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1748675402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538512938.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2540611173.00000000055C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1749625509.0000000002560000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2538511146.00000000041E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538743686.0000000004900000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2528459776.0000000002C20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.1752374705.0000000003F10000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1748675402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538512938.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2540611173.00000000055C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1749625509.0000000002560000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2538511146.00000000041E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2538743686.0000000004900000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2528459776.0000000002C20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                3
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory113
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)612
                Process Injection
                1
                Abuse Elevation Control Mechanism
                Security Account Manager221
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput Capture4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Masquerading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt41
                Virtualization/Sandbox Evasion
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron612
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1618204 Sample: laser.ps1 Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 39 www.seasay.xyz 2->39 41 www.l63339.xyz 2->41 43 4 other IPs or domains 2->43 61 Suricata IDS alerts for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for URL or domain 2->65 69 5 other signatures 2->69 11 powershell.exe 16 2->11         started        15 notepad.exe 5 2->15         started        signatures3 67 Performs DNS queries to domains with low reputation 41->67 process4 file5 37 C:\Users\user\AppData\Local\Temp\x.exe, PE32 11->37 dropped 75 Suspicious execution chain found 11->75 77 Found suspicious powershell code related to unpacking or dynamic code loading 11->77 79 Powershell drops PE file 11->79 17 x.exe 3 11->17         started        20 conhost.exe 11->20         started        signatures6 process7 signatures8 53 Antivirus detection for dropped file 17->53 55 Multi AV Scanner detection for dropped file 17->55 57 Writes to foreign memory regions 17->57 59 2 other signatures 17->59 22 RegAsm.exe 17->22         started        process9 signatures10 71 Maps a DLL or memory area into another process 22->71 25 UmhFZco3dB3hLZpEx5uvm.exe 22->25 injected process11 signatures12 73 Found direct / indirect Syscall (likely to bypass EDR) 25->73 28 runonce.exe 13 25->28         started        process13 signatures14 81 Tries to steal Mail credentials (via file / registry access) 28->81 83 Tries to harvest and steal browser information (history, passwords, etc) 28->83 85 Modifies the context of a thread in another process (thread injection) 28->85 87 3 other signatures 28->87 31 UmhFZco3dB3hLZpEx5uvm.exe 28->31 injected 35 firefox.exe 28->35         started        process15 dnsIp16 45 www.seasay.xyz 103.106.67.112, 49976, 49977, 49978 VOYAGERNET-AS-APVoyagerInternetLtdNZ New Zealand 31->45 47 www.lucynoel6465.shop 104.21.64.1, 49984, 49985, 49986 CLOUDFLARENETUS United States 31->47 49 3 other IPs or domains 31->49 51 Found direct / indirect Syscall (likely to bypass EDR) 31->51 signatures17

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.