Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
laser (2).ps1

Overview

General Information

Sample name:laser (2).ps1
Analysis ID:1618208
MD5:7ac3423210ed1bb180305d0035ddfe81
SHA1:4f8c76bf32e5999b2be339a4132781b88d61dbfb
SHA256:aeabb0a4ea0a655d44e11c613ba5f07496fadef5e6d36a17a700180c14dd9dd4
Tags:ps1tumbetgirislinki-fituser-JAMESWT_MHT
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Use Short Name Path in Command Line
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 6752 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 2436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • x.exe (PID: 5260 cmdline: "C:\Users\user~1\AppData\Local\Temp\x.exe" MD5: 3194BA383C0DD1421010924545808026)
      • RegAsm.exe (PID: 6356 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • RegAsm.exe (PID: 5128 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • pWjI78htpJ4.exe (PID: 1292 cmdline: "C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\qJ70pQvkMt.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • runonce.exe (PID: 1504 cmdline: "C:\Windows\SysWOW64\runonce.exe" MD5: 9E16655119DDE1B24A741C4FD4AD08FC)
            • pWjI78htpJ4.exe (PID: 6952 cmdline: "C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\l1unwRwGzd.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
            • firefox.exe (PID: 3808 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • notepad.exe (PID: 4184 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\laser (2).ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.1733946439.0000000003040000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000010.00000002.3731547549.0000000002D40000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000F.00000002.3731493934.0000000004ED0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000F.00000002.3727855592.00000000035E0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          0000000F.00000002.3719515035.0000000003200000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            6.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              6.2.RegAsm.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4720, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", ProcessId: 6752, ProcessName: powershell.exe
                Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\x.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\x.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\x.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\x.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\x.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6752, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\x.exe" , ProcessId: 5260, ProcessName: x.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4720, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1", ProcessId: 6752, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-18T18:40:47.867254+010028554651A Network Trojan was detected192.168.2.749969162.218.30.23580TCP
                2025-02-18T18:41:11.526828+010028554651A Network Trojan was detected192.168.2.749973103.106.67.11280TCP
                2025-02-18T18:41:26.206386+010028554651A Network Trojan was detected192.168.2.749977104.21.80.180TCP
                2025-02-18T18:41:39.851300+010028554651A Network Trojan was detected192.168.2.749981104.21.80.180TCP
                2025-02-18T18:41:53.805176+010028554651A Network Trojan was detected192.168.2.749985134.122.135.4880TCP
                2025-02-18T18:42:07.094922+010028554651A Network Trojan was detected192.168.2.749989162.0.231.20380TCP
                2025-02-18T18:42:20.241829+010028554651A Network Trojan was detected192.168.2.74999366.33.60.6780TCP
                2025-02-18T18:42:33.398234+010028554651A Network Trojan was detected192.168.2.74999713.248.169.4880TCP
                2025-02-18T18:42:47.809288+010028554651A Network Trojan was detected192.168.2.750001160.238.85.15880TCP
                2025-02-18T18:43:01.395310+010028554651A Network Trojan was detected192.168.2.750005217.160.0.24080TCP
                2025-02-18T18:43:14.921013+010028554651A Network Trojan was detected192.168.2.750009188.114.96.380TCP
                2025-02-18T18:43:28.139729+010028554651A Network Trojan was detected192.168.2.750013199.59.243.22880TCP
                2025-02-18T18:43:41.418629+010028554651A Network Trojan was detected192.168.2.750017199.59.243.22880TCP
                2025-02-18T18:43:56.590864+010028554651A Network Trojan was detected192.168.2.750021162.210.199.7380TCP
                2025-02-18T18:44:10.866627+010028554651A Network Trojan was detected192.168.2.750025213.176.96.19880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-18T18:41:03.868206+010028554641A Network Trojan was detected192.168.2.749970103.106.67.11280TCP
                2025-02-18T18:41:06.439860+010028554641A Network Trojan was detected192.168.2.749971103.106.67.11280TCP
                2025-02-18T18:41:09.233448+010028554641A Network Trojan was detected192.168.2.749972103.106.67.11280TCP
                2025-02-18T18:41:18.100027+010028554641A Network Trojan was detected192.168.2.749974104.21.80.180TCP
                2025-02-18T18:41:20.646848+010028554641A Network Trojan was detected192.168.2.749975104.21.80.180TCP
                2025-02-18T18:41:23.193733+010028554641A Network Trojan was detected192.168.2.749976104.21.80.180TCP
                2025-02-18T18:41:32.771952+010028554641A Network Trojan was detected192.168.2.749978104.21.80.180TCP
                2025-02-18T18:41:34.714374+010028554641A Network Trojan was detected192.168.2.749979104.21.80.180TCP
                2025-02-18T18:41:37.167811+010028554641A Network Trojan was detected192.168.2.749980104.21.80.180TCP
                2025-02-18T18:41:46.144104+010028554641A Network Trojan was detected192.168.2.749982134.122.135.4880TCP
                2025-02-18T18:41:48.718923+010028554641A Network Trojan was detected192.168.2.749983134.122.135.4880TCP
                2025-02-18T18:41:51.227604+010028554641A Network Trojan was detected192.168.2.749984134.122.135.4880TCP
                2025-02-18T18:41:59.470325+010028554641A Network Trojan was detected192.168.2.749986162.0.231.20380TCP
                2025-02-18T18:42:02.035831+010028554641A Network Trojan was detected192.168.2.749987162.0.231.20380TCP
                2025-02-18T18:42:04.538860+010028554641A Network Trojan was detected192.168.2.749988162.0.231.20380TCP
                2025-02-18T18:42:12.664929+010028554641A Network Trojan was detected192.168.2.74999066.33.60.6780TCP
                2025-02-18T18:42:15.223643+010028554641A Network Trojan was detected192.168.2.74999166.33.60.6780TCP
                2025-02-18T18:42:17.706784+010028554641A Network Trojan was detected192.168.2.74999266.33.60.6780TCP
                2025-02-18T18:42:25.744085+010028554641A Network Trojan was detected192.168.2.74999413.248.169.4880TCP
                2025-02-18T18:42:28.314753+010028554641A Network Trojan was detected192.168.2.74999513.248.169.4880TCP
                2025-02-18T18:42:30.842142+010028554641A Network Trojan was detected192.168.2.74999613.248.169.4880TCP
                2025-02-18T18:42:40.066225+010028554641A Network Trojan was detected192.168.2.749998160.238.85.15880TCP
                2025-02-18T18:42:42.687334+010028554641A Network Trojan was detected192.168.2.749999160.238.85.15880TCP
                2025-02-18T18:42:45.157948+010028554641A Network Trojan was detected192.168.2.750000160.238.85.15880TCP
                2025-02-18T18:42:53.773724+010028554641A Network Trojan was detected192.168.2.750002217.160.0.24080TCP
                2025-02-18T18:42:56.305309+010028554641A Network Trojan was detected192.168.2.750003217.160.0.24080TCP
                2025-02-18T18:42:58.859459+010028554641A Network Trojan was detected192.168.2.750004217.160.0.24080TCP
                2025-02-18T18:43:07.154739+010028554641A Network Trojan was detected192.168.2.750006188.114.96.380TCP
                2025-02-18T18:43:09.704879+010028554641A Network Trojan was detected192.168.2.750007188.114.96.380TCP
                2025-02-18T18:43:12.318085+010028554641A Network Trojan was detected192.168.2.750008188.114.96.380TCP
                2025-02-18T18:43:20.515860+010028554641A Network Trojan was detected192.168.2.750010199.59.243.22880TCP
                2025-02-18T18:43:23.078565+010028554641A Network Trojan was detected192.168.2.750011199.59.243.22880TCP
                2025-02-18T18:43:25.630936+010028554641A Network Trojan was detected192.168.2.750012199.59.243.22880TCP
                2025-02-18T18:43:33.771113+010028554641A Network Trojan was detected192.168.2.750014199.59.243.22880TCP
                2025-02-18T18:43:36.299386+010028554641A Network Trojan was detected192.168.2.750015199.59.243.22880TCP
                2025-02-18T18:43:38.851462+010028554641A Network Trojan was detected192.168.2.750016199.59.243.22880TCP
                2025-02-18T18:43:47.204575+010028554641A Network Trojan was detected192.168.2.750018162.210.199.7380TCP
                2025-02-18T18:43:49.828951+010028554641A Network Trojan was detected192.168.2.750019162.210.199.7380TCP
                2025-02-18T18:43:52.450170+010028554641A Network Trojan was detected192.168.2.750020162.210.199.7380TCP
                2025-02-18T18:44:03.033577+010028554641A Network Trojan was detected192.168.2.750022213.176.96.19880TCP
                2025-02-18T18:44:05.721718+010028554641A Network Trojan was detected192.168.2.750023213.176.96.19880TCP
                2025-02-18T18:44:08.124613+010028554641A Network Trojan was detected192.168.2.750024213.176.96.19880TCP
                2025-02-18T18:44:16.418809+010028554641A Network Trojan was detected192.168.2.750026199.59.243.22880TCP
                2025-02-18T18:44:18.983829+010028554641A Network Trojan was detected192.168.2.750027199.59.243.22880TCP
                2025-02-18T18:44:21.522935+010028554641A Network Trojan was detected192.168.2.750028199.59.243.22880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.topitch.top/goj6/?jLKPrvv=90Ns8gSHVfuKmwMskYN175qt0l+UYxk4CHvhiyRIaCFX9JzO3hXkP8KhIgrW4So8W45OggNWRvJOekdu518DaUGFYZXR3z02vfmR3I3w4s/Ij1npIVCelEqXEJVOfL6H94xHE9RXLphk&3Je=YbITAvira URL Cloud: Label: malware
                Source: http://www.lucynoel6465.shop/jgkl/?jLKPrvv=hI+cEEoDMRK5HtHlz4V8IEOzbfVROUzo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2Dlpa+IqhGLYCnqltFYDkW9rwSVxH+ZM2/XnYhAogS2Zyd/o6zK+cbwINARG&3Je=YbITAvira URL Cloud: Label: malware
                Source: https://www.seasay.xyz/c9ts/?jLKPrvv=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAAvira URL Cloud: Label: malware
                Source: http://www.jyc11.top/baqk/Avira URL Cloud: Label: malware
                Source: http://www.besttreasurespot.shopAvira URL Cloud: Label: malware
                Source: http://www.jyc11.top/baqk/?jLKPrvv=uI1AML1lKsYfKpBjOYYBTsW2eceMYAINrtsxZHex5MMBBnuaf6/bImWsfHxWa/VaEP1krQYtY2JPJ2rDPpQjXb/1t9o3oBCV/hwDbWSGcgceG0DIqaiwMJhtI/GZr2tc+jDdjdgzJXC1&3Je=YbITAvira URL Cloud: Label: malware
                Source: http://www.kjuw.party/e0jv/?jLKPrvv=T5a+nPXa7vHYgORYo4/nz9dQiuUIDqRyja1Bw4L97U3J4ftOxLqNqCnP0drWj2p7z+i5x9/xm7UTGnu+MMyQhOsx+uzIcWWFswczbpvbbSQGGU4ijnRmFI/iSrohGZkBVJ02P2fo5ikl&3Je=YbITAvira URL Cloud: Label: malware
                Source: http://www.l63339.xyz/vhr7/?3Je=YbIT&jLKPrvv=iaSfD1StI7hDT4qIAMii2AJAHOe0qHDn7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4s0DPw8ZLv8n+jVvEkjzRDyf1FFJKGTm/x08ZOhgwkEPf0hvFuhdZt1S6Avira URL Cloud: Label: malware
                Source: http://www.topitch.top/goj6/Avira URL Cloud: Label: phishing
                Source: http://www.besttreasurespot.shop/xvk7/?jLKPrvv=D2H6cq8Q3DqiMWUz+FL3wQH40ji/h/G6FkzDQm1Pm2pV5QPYVMTgQxtmL2CGdLit/09zCaV5brcnjhHMK3Gueaf12Ye+Amp96oHs3fpUhIM3fzUce1anmYo//XoVbQduiVtmIFHvIsto&3Je=YbITAvira URL Cloud: Label: malware
                Source: http://www.besttreasurespot.shop/xvk7/Avira URL Cloud: Label: malware
                Source: http://www.seasay.xyz/c9ts/?jLKPrvv=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7Qzpj06nGEzNEnovnPrsEb7KL1brrzNpzul2VEXvMTZ1g4GQAuWECb3v8&3Je=YbITAvira URL Cloud: Label: malware
                Source: http://www.tumbetgirislinki.fit/k566/?3Je=YbIT&jLKPrvv=RARW43WNMKajmHoYlEtIRJLMiezSzeuXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe+MdLjldftk+pS4j839nhzGVAWPSO5aQYaeXSj4P+pnuEIGWZVsh7JvfNAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
                Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 87%
                Source: laser (2).ps1Virustotal: Detection: 49%Perma Link
                Source: laser (2).ps1ReversingLabs: Detection: 40%
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1733946439.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.3731547549.0000000002D40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3731493934.0000000004ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3727855592.00000000035E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3719515035.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1733243869.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3731500134.0000000002CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1735711958.00000000034B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Binary string: CVZXCVHDF.pdb source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000004.00000000.1249155312.0000000000C5E000.00000002.00000001.01000000.0000000A.sdmp, x.exe.0.dr
                Source: Binary string: runonce.pdbGCTL source: pWjI78htpJ4.exe, 0000000E.00000002.3729154264.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: RegAsm.exe, 00000006.00000002.1734135960.0000000003160000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3731805345.00000000053CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3731805345.0000000005230000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1733521819.0000000004ED3000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1735774636.0000000005086000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 00000006.00000002.1734135960.0000000003160000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, runonce.exe, 0000000F.00000002.3731805345.00000000053CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3731805345.0000000005230000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1733521819.0000000004ED3000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1735774636.0000000005086000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: CVZXCVHDF.pdb\ source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000004.00000000.1249155312.0000000000C5E000.00000002.00000001.01000000.0000000A.sdmp, x.exe.0.dr
                Source: Binary string: runonce.pdb source: pWjI78htpJ4.exe, 0000000E.00000002.3729154264.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: pWjI78htpJ4.exe, 0000000E.00000002.3720605673.00000000006EF000.00000002.00000001.01000000.0000000C.sdmp, pWjI78htpJ4.exe, 00000010.00000000.1800564375.00000000006EF000.00000002.00000001.01000000.0000000C.sdmp
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0321C8D0 FindFirstFileW,FindNextFileW,FindClose,15_2_0321C8D0

                Software Vulnerabilities

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 4x nop then xor eax, eax15_2_03209EF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 4x nop then mov ebx, 00000004h15_2_04FD04E8
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D62A95
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D60AA6
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then xor eax, eax16_2_02D662A3
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D71A1A
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D718A4
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D71860
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D71989
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 4x nop then pop edi16_2_02D7193C

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49973 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49971 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49980 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49975 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49995 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49983 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49969 -> 162.218.30.235:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50007 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49981 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49979 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49970 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49978 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49987 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49996 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50017 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49985 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49974 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49988 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50009 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50013 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50010 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49992 -> 66.33.60.67:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49977 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49990 -> 66.33.60.67:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50022 -> 213.176.96.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50020 -> 162.210.199.73:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50021 -> 162.210.199.73:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49986 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49993 -> 66.33.60.67:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50006 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50004 -> 217.160.0.240:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49994 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49982 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50008 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49976 -> 104.21.80.1:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50001 -> 160.238.85.158:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49972 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49989 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50018 -> 162.210.199.73:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50003 -> 217.160.0.240:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50012 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50016 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50002 -> 217.160.0.240:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49997 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50005 -> 217.160.0.240:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50011 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50025 -> 213.176.96.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49999 -> 160.238.85.158:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50024 -> 213.176.96.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50000 -> 160.238.85.158:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50026 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50027 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50015 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50023 -> 213.176.96.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49984 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49998 -> 160.238.85.158:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50014 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50028 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50019 -> 162.210.199.73:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49991 -> 66.33.60.67:80
                Source: DNS query: www.l63339.xyz
                Source: DNS query: www.seasay.xyz
                Source: DNS query: www.autonomousrich.xyz
                Source: DNS query: www.nmw365.xyz
                Source: Joe Sandbox ViewIP Address: 103.106.67.112 103.106.67.112
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                Source: Joe Sandbox ViewASN Name: POWERLINE-AS-APPOWERLINEDATACENTERHK POWERLINE-AS-APPOWERLINEDATACENTERHK
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /vhr7/?3Je=YbIT&jLKPrvv=iaSfD1StI7hDT4qIAMii2AJAHOe0qHDn7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4s0DPw8ZLv8n+jVvEkjzRDyf1FFJKGTm/x08ZOhgwkEPf0hvFuhdZt1S6 HTTP/1.1Host: www.l63339.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /c9ts/?jLKPrvv=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7Qzpj06nGEzNEnovnPrsEb7KL1brrzNpzul2VEXvMTZ1g4GQAuWECb3v8&3Je=YbIT HTTP/1.1Host: www.seasay.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /k566/?3Je=YbIT&jLKPrvv=RARW43WNMKajmHoYlEtIRJLMiezSzeuXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe+MdLjldftk+pS4j839nhzGVAWPSO5aQYaeXSj4P+pnuEIGWZVsh7JvfN HTTP/1.1Host: www.tumbetgirislinki.fitAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /jgkl/?jLKPrvv=hI+cEEoDMRK5HtHlz4V8IEOzbfVROUzo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2Dlpa+IqhGLYCnqltFYDkW9rwSVxH+ZM2/XnYhAogS2Zyd/o6zK+cbwINARG&3Je=YbIT HTTP/1.1Host: www.lucynoel6465.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /e0jv/?jLKPrvv=T5a+nPXa7vHYgORYo4/nz9dQiuUIDqRyja1Bw4L97U3J4ftOxLqNqCnP0drWj2p7z+i5x9/xm7UTGnu+MMyQhOsx+uzIcWWFswczbpvbbSQGGU4ijnRmFI/iSrohGZkBVJ02P2fo5ikl&3Je=YbIT HTTP/1.1Host: www.kjuw.partyAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /goj6/?jLKPrvv=90Ns8gSHVfuKmwMskYN175qt0l+UYxk4CHvhiyRIaCFX9JzO3hXkP8KhIgrW4So8W45OggNWRvJOekdu518DaUGFYZXR3z02vfmR3I3w4s/Ij1npIVCelEqXEJVOfL6H94xHE9RXLphk&3Je=YbIT HTTP/1.1Host: www.topitch.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /djyl/?jLKPrvv=x4UYXwVOLjDEdQDRDI++Xtp6PNmrq7huXBbMFKiZ0gPoO4cAuWUld7aOUpT7mf2hDxK0oNwUa8NOb38b0vRz8W7xEr5q9i1+FtnFOkXOjRvyYuCvjuSwX62ELWAg5qJlUg38lwe6F78M&3Je=YbIT HTTP/1.1Host: www.partflix.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /qejj/?jLKPrvv=PpgyVvjpBOBybA0RbpuAm+uTuPWX1fDQ7x0KObR0TUF97L5S0+m/tmQdUijwUCZ7QEWVmW2RSQCCxQKcArG0insqTTsC+3ZRA/aJ2L8M8sYoHwl1n6oF+kMFN/XSrm1L/ejEE584fGKP&3Je=YbIT HTTP/1.1Host: www.autonomousrich.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /baqk/?jLKPrvv=uI1AML1lKsYfKpBjOYYBTsW2eceMYAINrtsxZHex5MMBBnuaf6/bImWsfHxWa/VaEP1krQYtY2JPJ2rDPpQjXb/1t9o3oBCV/hwDbWSGcgceG0DIqaiwMJhtI/GZr2tc+jDdjdgzJXC1&3Je=YbIT HTTP/1.1Host: www.jyc11.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /p3wh/?jLKPrvv=Hd2sFJVZ8LcLc2zq8SS/jY43YG5m/Gon+jiZ/fyxngK/n/iKSxNvyY3CXM04E4ES47mi5u1FYqRlLPE2yslLzG24xnyQh+iOi0SBXbELiFGcRCcmRe4JRHntEkBqqUEZzkIQdJnu5IEF&3Je=YbIT HTTP/1.1Host: www.solucionesclinicas.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /d3qr/?3Je=YbIT&jLKPrvv=adxeJJsQURDbBvCDbk0BQj+uIV6cESBqPre5BCvLy1d87p28QgcEqVbbk5ik4N9jwb72Egzt44/T7B+6DD1KPq0l9c4lYUhz35uurmsr5c8QUnhs25UDwGQQKqIfAEm+Gb+gKvIF3mUH HTTP/1.1Host: www.nmw365.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /oigm/?jLKPrvv=fuBWCKRrr8969+VzHs9AcPXZRXUa1JiFDVq8egneuNI/nSVjEBFKaLkRuSerrPtgdavOqtuPr6fGsE/TlJUMP0rU1ObIISYKpFBFrSbkPc7NHxCLMpQTKjTGiJ/A4whZLpAiilgayLFl&3Je=YbIT HTTP/1.1Host: www.epdemexi.latAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /5m6k/?jLKPrvv=CFDajtldEjmLCpsutpw37x98DYFAYxNMDhQ3gxI8ryo2/SDJw6ppQfSlCfaEfAhookiKYLSVtVynP1r/lBay82wqoXBq9z5kNRKzAT93HOBGIZZFzxN/dYs5B/ZMvVHkMa7Mwl31dTrB&3Je=YbIT HTTP/1.1Host: www.sscexampyq.watchesAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /xvk7/?jLKPrvv=D2H6cq8Q3DqiMWUz+FL3wQH40ji/h/G6FkzDQm1Pm2pV5QPYVMTgQxtmL2CGdLit/09zCaV5brcnjhHMK3Gueaf12Ye+Amp96oHs3fpUhIM3fzUce1anmYo//XoVbQduiVtmIFHvIsto&3Je=YbIT HTTP/1.1Host: www.besttreasurespot.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficDNS traffic detected: DNS query: www.l63339.xyz
                Source: global trafficDNS traffic detected: DNS query: www.seasay.xyz
                Source: global trafficDNS traffic detected: DNS query: www.tumbetgirislinki.fit
                Source: global trafficDNS traffic detected: DNS query: www.lucynoel6465.shop
                Source: global trafficDNS traffic detected: DNS query: www.kjuw.party
                Source: global trafficDNS traffic detected: DNS query: www.topitch.top
                Source: global trafficDNS traffic detected: DNS query: www.partflix.net
                Source: global trafficDNS traffic detected: DNS query: www.autonomousrich.xyz
                Source: global trafficDNS traffic detected: DNS query: www.jyc11.top
                Source: global trafficDNS traffic detected: DNS query: www.solucionesclinicas.net
                Source: global trafficDNS traffic detected: DNS query: www.nmw365.xyz
                Source: global trafficDNS traffic detected: DNS query: www.epdemexi.lat
                Source: global trafficDNS traffic detected: DNS query: www.sscexampyq.watches
                Source: global trafficDNS traffic detected: DNS query: www.besttreasurespot.shop
                Source: global trafficDNS traffic detected: DNS query: www.szty13.vip
                Source: global trafficDNS traffic detected: DNS query: www.velquest.live
                Source: unknownHTTP traffic detected: POST /c9ts/ HTTP/1.1Host: www.seasay.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateOrigin: http://www.seasay.xyzReferer: http://www.seasay.xyz/c9ts/Content-Length: 220Cache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5Data Raw: 6a 4c 4b 50 72 76 76 3d 57 30 4a 59 34 44 6c 67 38 7a 6d 57 35 46 36 57 58 32 78 58 4d 50 49 78 69 4a 75 36 49 52 48 59 6e 55 4c 6b 7a 41 74 66 75 65 4b 75 72 51 35 70 50 52 74 73 32 58 79 46 63 6c 75 6f 49 52 59 54 59 4b 44 4b 54 43 74 31 59 32 2f 49 30 47 63 49 70 45 34 70 57 54 45 55 36 4b 7a 67 50 58 5a 69 6f 64 6d 78 4c 71 6f 66 58 49 2b 4c 37 36 62 4b 35 66 52 48 31 69 32 65 45 32 57 75 44 59 42 30 36 32 51 56 2f 32 4d 73 62 32 48 6b 75 32 32 5a 47 36 32 51 35 4f 2b 50 30 55 43 61 74 4b 43 4f 31 50 65 31 62 32 68 5a 31 77 32 2f 37 5a 41 2f 31 69 55 4a 65 31 6c 63 56 34 50 67 66 68 49 71 4e 47 72 71 31 48 69 72 77 33 5a 38 4d 66 31 69 75 77 3d 3d Data Ascii: jLKPrvv=W0JY4Dlg8zmW5F6WX2xXMPIxiJu6IRHYnULkzAtfueKurQ5pPRts2XyFcluoIRYTYKDKTCt1Y2/I0GcIpE4pWTEU6KzgPXZiodmxLqofXI+L76bK5fRH1i2eE2WuDYB062QV/2Msb2Hku22ZG62Q5O+P0UCatKCO1Pe1b2hZ1w2/7ZA/1iUJe1lcV4PgfhIqNGrq1Hirw3Z8Mf1iuw==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:41:26 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeAccept-Ranges: bytesCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0cf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hoXIRiWNng8bG2tUxXOTok6zARcUreektK4736ENeQjHIHkucbjRqzbjgh4FYC4YKrIODIKBEXzfdqksCyxjNpXZoNP6dCmiR%2BpirOZZBuo2nU3qiINkSz4GSJqUJwuqGzbYL6%2BGvqT1I1U%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fcecd4a241f4c-DENalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=45286&min_rtt=45286&rtt_var=22643&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=564&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 61 35 66 0d 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 Data Ascii: 2a5f<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:41:34 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fKtG87Dl8vCVymNjQ3Bugum40n36x6DZPpzS%2B18F31u9uwfBUuypByC9KWnDuEo2G71XeUC4QdBvozWhgozLHe2VHoyihxNyDJZ6GHQsY5rk5A3NKm5b3vThFBUz2lCQOOqla4sqIVQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fcf093db9e80b-DFWContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=37322&min_rtt=37322&rtt_var=18661&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=854&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 74(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:41:37 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KLy%2BeDp5FR1z35%2BBbFJM0Mi9YU635fdKM26GCvAEo9dWiH1FDhjSSSwsvJhrXs7XG33mLwy2HUBXxpPbkjv8R04fyppx38XFrTJEPZUpNlh%2FdlKRYdwEn9GhRckerddaFZQENrTKNec%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fcf18ec0c629f-ORDContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=20350&min_rtt=20350&rtt_var=10175&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1867&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 74(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:41:39 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HDTij1PhNd5PDR6xlrNdXUtaFgwYXMN18pk4RJL56a3IRbke3hSQU3xieZoBG2LgzDBr3x%2FLrOPBvratVIPt2Ec3epO52SM4jXhhBTHxb62JHCkFC%2F99Jh0eNj5r10%2F0SMYFwsu1Z9M%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fcf293a0a485f-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=38898&min_rtt=38898&rtt_var=19449&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=561&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 39 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 99<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0</center></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:41:45 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:41:48 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:41:51 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 18 Feb 2025 17:41:53 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:41:59 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:42:01 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:42:04 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:42:07 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 18 Feb 2025 17:42:53 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 6d 91 4d 4f c3 30 0c 86 ef fc 0a 13 ce 6d 56 c6 61 eb da 49 a3 ab 04 12 ac a8 2a 5f c7 d0 66 34 52 9a 94 d4 63 1b bf 9e 24 e3 5b 9c e2 38 af 9f d7 76 92 e3 65 91 55 8f 37 39 b4 d8 49 b8 b9 3d bf ba cc 80 04 94 de 8f 33 4a 97 d5 12 1e 2e aa eb 2b 88 c2 11 54 86 a9 41 a0 d0 8a 49 4a f3 15 39 22 2d 62 1f 53 ba dd 6e c3 ed 38 d4 e6 99 56 25 dd 39 56 e4 8a 3f c2 00 7f 54 86 0d 36 64 7e 94 78 43 c9 d4 73 4a b8 22 b0 eb 64 fc eb a6 86 f4 1f 7c 34 9d 4e 0f 54 cb 80 a4 e5 ac b1 27 24 28 50 72 17 41 6e 8c 36 70 36 3a 3b 76 79 fa f5 90 74 1c 19 d4 5a 21 57 98 12 e4 3b a4 ae 87 19 d4 2d 33 03 c7 74 83 eb 60 42 ec 26 b0 0f f8 cb 46 bc a6 24 3b c8 83 6a df 73 67 08 7f 28 4a 07 35 ab 5b fe bb ca a7 02 67 65 b4 f4 7d d2 8f 46 93 27 dd ec 61 c0 bd e4 29 59 5b 41 b0 66 9d 90 fb 98 19 c1 e4 ec 60 d1 46 9f 8a 5a 4b 6d e2 93 11 1b 9f 4e ea 99 d7 0f e2 8d c7 f6 37 78 77 50 43 5e 96 45 e9 e6 8d 61 51 66 17 97 77 05 ac 0a c8 57 59 b1 aa ca c5 b2 f0 5b 68 23 df 7c ff 09 fe 46 8d c2 c9 37 4a 42 a3 eb 4d 67 17 a4 61 d0 52 d4 02 59 a3 41 69 68 19 0c c2 86 5c f9 b1 6c 36 f4 e0 de 72 13 ea a6 b2 5f ea f7 39 7f 07 4c e8 1e 7e 54 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 181mMO0mVaI*_f4Rc$[8veU79I=3J.+TAIJ9"-bSn8V%9V?T6d~xCsJ"d|4NT'$(PrAn6p6:;vytZ!W;-3t`B&F$;jsg(J5[ge}F'a)Y[Af`FZKmN7xwPC^EaQfwWY[h#|F7JBMgaRYAih\l6r_9L~T0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 18 Feb 2025 17:42:56 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 6d 91 4d 4f c3 30 0c 86 ef fc 0a 13 ce 6d 56 c6 61 eb da 49 a3 ab 04 12 ac a8 2a 5f c7 d0 66 34 52 9a 94 d4 63 1b bf 9e 24 e3 5b 9c e2 38 af 9f d7 76 92 e3 65 91 55 8f 37 39 b4 d8 49 b8 b9 3d bf ba cc 80 04 94 de 8f 33 4a 97 d5 12 1e 2e aa eb 2b 88 c2 11 54 86 a9 41 a0 d0 8a 49 4a f3 15 39 22 2d 62 1f 53 ba dd 6e c3 ed 38 d4 e6 99 56 25 dd 39 56 e4 8a 3f c2 00 7f 54 86 0d 36 64 7e 94 78 43 c9 d4 73 4a b8 22 b0 eb 64 fc eb a6 86 f4 1f 7c 34 9d 4e 0f 54 cb 80 a4 e5 ac b1 27 24 28 50 72 17 41 6e 8c 36 70 36 3a 3b 76 79 fa f5 90 74 1c 19 d4 5a 21 57 98 12 e4 3b a4 ae 87 19 d4 2d 33 03 c7 74 83 eb 60 42 ec 26 b0 0f f8 cb 46 bc a6 24 3b c8 83 6a df 73 67 08 7f 28 4a 07 35 ab 5b fe bb ca a7 02 67 65 b4 f4 7d d2 8f 46 93 27 dd ec 61 c0 bd e4 29 59 5b 41 b0 66 9d 90 fb 98 19 c1 e4 ec 60 d1 46 9f 8a 5a 4b 6d e2 93 11 1b 9f 4e ea 99 d7 0f e2 8d c7 f6 37 78 77 50 43 5e 96 45 e9 e6 8d 61 51 66 17 97 77 05 ac 0a c8 57 59 b1 aa ca c5 b2 f0 5b 68 23 df 7c ff 09 fe 46 8d c2 c9 37 4a 42 a3 eb 4d 67 17 a4 61 d0 52 d4 02 59 a3 41 69 68 19 0c c2 86 5c f9 b1 6c 36 f4 e0 de 72 13 ea a6 b2 5f ea f7 39 7f 07 4c e8 1e 7e 54 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 181mMO0mVaI*_f4Rc$[8veU79I=3J.+TAIJ9"-bSn8V%9V?T6d~xCsJ"d|4NT'$(PrAn6p6:;vytZ!W;-3t`B&F$;jsg(J5[ge}F'a)Y[Af`FZKmN7xwPC^EaQfwWY[h#|F7JBMgaRYAih\l6r_9L~T0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 18 Feb 2025 17:42:58 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 6d 91 4d 4f c3 30 0c 86 ef fc 0a 13 ce 6d 56 c6 61 eb da 49 a3 ab 04 12 ac a8 2a 5f c7 d0 66 34 52 9a 94 d4 63 1b bf 9e 24 e3 5b 9c e2 38 af 9f d7 76 92 e3 65 91 55 8f 37 39 b4 d8 49 b8 b9 3d bf ba cc 80 04 94 de 8f 33 4a 97 d5 12 1e 2e aa eb 2b 88 c2 11 54 86 a9 41 a0 d0 8a 49 4a f3 15 39 22 2d 62 1f 53 ba dd 6e c3 ed 38 d4 e6 99 56 25 dd 39 56 e4 8a 3f c2 00 7f 54 86 0d 36 64 7e 94 78 43 c9 d4 73 4a b8 22 b0 eb 64 fc eb a6 86 f4 1f 7c 34 9d 4e 0f 54 cb 80 a4 e5 ac b1 27 24 28 50 72 17 41 6e 8c 36 70 36 3a 3b 76 79 fa f5 90 74 1c 19 d4 5a 21 57 98 12 e4 3b a4 ae 87 19 d4 2d 33 03 c7 74 83 eb 60 42 ec 26 b0 0f f8 cb 46 bc a6 24 3b c8 83 6a df 73 67 08 7f 28 4a 07 35 ab 5b fe bb ca a7 02 67 65 b4 f4 7d d2 8f 46 93 27 dd ec 61 c0 bd e4 29 59 5b 41 b0 66 9d 90 fb 98 19 c1 e4 ec 60 d1 46 9f 8a 5a 4b 6d e2 93 11 1b 9f 4e ea 99 d7 0f e2 8d c7 f6 37 78 77 50 43 5e 96 45 e9 e6 8d 61 51 66 17 97 77 05 ac 0a c8 57 59 b1 aa ca c5 b2 f0 5b 68 23 df 7c ff 09 fe 46 8d c2 c9 37 4a 42 a3 eb 4d 67 17 a4 61 d0 52 d4 02 59 a3 41 69 68 19 0c c2 86 5c f9 b1 6c 36 f4 e0 de 72 13 ea a6 b2 5f ea f7 39 7f 07 4c e8 1e 7e 54 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 181mMO0mVaI*_f4Rc$[8veU79I=3J.+TAIJ9"-bSn8V%9V?T6d~xCsJ"d|4NT'$(PrAn6p6:;vytZ!W;-3t`B&F$;jsg(J5[ge}F'a)Y[Af`FZKmN7xwPC^EaQfwWY[h#|F7JBMgaRYAih\l6r_9L~T0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 596Connection: closeDate: Tue, 18 Feb 2025 17:43:01 GMTServer: ApacheData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 21 0a 20 20 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 22 3e 0a 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 30 61 33 32 38 63 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 30 65 6d 3b 22 3e 0a 20 20 20 45 52 52 4f 52 20 34 30 34 3a 20 41 52 43 48 49 56 4f 20 4e 4f 20 45 4e 43 4f 4e 54 52 41 44 4f 0a 20 20 3c 2f 68 31 3e 0a 20 20 3c 70 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 30 2e 38 65 6d 3b 22 3e 0a 20 20 20 45 6c 20 64 6f 63 75 6d 65 6e 74 6f 20 73 6f 6c 69 63 69 74 61 64 6f 20 6e 6f 20 68 61 20 73 69 64 6f 20 65 6e 63 6f 6e 74 72 61 64 6f 2e 0a 20 20 3c 2f 70 3e 0a 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"> <head> <title> Error 404! </title> <meta content="text/html; charset=utf-8" http-equiv="Content-Type"> <meta content="no-cache" http-equiv="cache-control"> </head> <body style="font-family:arial;"> <h1 style="color:#0a328c;font-size:1.0em;"> ERROR 404: ARCHIVO NO ENCONTRADO </h1> <p style="font-size:0.8em;"> El documento solicitado no ha sido encontrado. </p> </body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:43:07 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5CP%2BeC4JUT8dzrIl%2B2hUPY64C5JBAFMYrUouebQkTaHIBhpUDadhX6jUOGp0BSxAWBwrjt6d%2FgggvhqEubI%2FEZtrsnhsS%2F9rhnleAQJkz3Ed%2FwVhgN2ExrCAXHpkLEjC5A%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fd14cadb2ba0c-SEAContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=67049&min_rtt=67049&rtt_var=33524&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=813&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 35 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b2 29 4e 2e ca 2c 28 b1 2b cf cc 4b c9 2f d7 cb c9 4f 4e 2c c9 cc cf d3 cb 28 4a 4d 53 b0 55 50 ca 28 29 29 28 b6 d2 d7 2f 2f 2f d7 cb cb 2d 37 36 33 d5 ab a8 ac 52 b2 d1 87 ea 03 00 00 00 ff ff 03 00 af c2 1c df 40 00 00 00 0d 0a Data Ascii: 55)N.,(+K/ON,(JMSUP())(///-763R@
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:43:09 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hiafNg42UMcAFLlBWRM%2F33T61BzNcNsU43lWLxSpqrIbpmC%2BuGm4Gu4VWi3XTMwOu651AVFsp8zWidVF45Rvb8tr1JZg6fovlb%2FjtOzI92d0fXyZPn6vJZvMld8l%2BLYxLw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fd15c1ba7a2b4-YULContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=17574&min_rtt=17574&rtt_var=8787&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=833&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 35 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b2 29 4e 2e ca 2c 28 b1 2b cf cc 4b c9 2f d7 cb c9 4f 4e 2c c9 cc cf d3 cb 28 4a 4d 53 b0 55 50 ca 28 29 29 28 b6 d2 d7 2f 2f 2f d7 cb cb 2d 37 36 33 d5 ab a8 ac 52 b2 d1 87 ea 03 00 00 00 ff ff 03 00 af c2 1c df 40 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 55)N.,(+K/ON,(JMSUP())(///-763R@0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:43:12 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1xEmpVzv%2BWL9yDAlzqGRbutAOCeuYCcic2V9mat3zMipPtBOBXP8TCxf8JGN3azLcXWcDwyUU2oH7xKyPeseLqTVIhCG9DaQRuDiMv1ZOx43AdW9DvEMA6FE0KNbZGyBkw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fd16cdd164763-DFWContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=52337&min_rtt=52337&rtt_var=26168&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1846&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 34 62 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b2 29 4e 2e ca 2c 28 b1 2b cf cc 4b c9 2f d7 cb c9 4f 4e 2c c9 cc cf d3 cb 28 4a 4d 53 b0 55 50 ca 28 29 29 28 b6 d2 d7 2f 2f 2f d7 cb cb 2d 37 36 33 d5 ab a8 ac 52 b2 d1 87 ea 03 00 00 00 ff ff 0d 0a 61 0d 0a 03 00 af c2 1c df 40 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 4b)N.,(+K/ON,(JMSUP())(///-763Ra@0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 18 Feb 2025 17:43:14 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8CHugJOk5Er2ritdSmZ7AfBeIvYjHryN5TkXBB0CjnclW0OujmKO3neVMi5Wln1fvM10DgiHLF8ejrqqVxTVVAR%2B6GqVtKqycGx8pKkms6c%2BYzKVSFzDyToy44SSLkUWaA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 913fd17cfce9acdb-MSPalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=32858&min_rtt=32858&rtt_var=16429&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=554&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 34 30 0d 0a 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 20 3d 20 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6e 6d 77 33 36 35 2e 78 79 7a 22 3c 2f 73 63 72 69 70 74 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 40<script>window.location.href = "https://www.nmw365.xyz"</script>0
                Source: runonce.exe, 0000000F.00000002.3732343518.0000000005F68000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.0000000003968000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
                Source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000000.00000002.1252079445.0000000005306000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1251229454.000000000313D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000000.00000002.1252079445.00000000051B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000000.00000002.1252079445.0000000005306000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1251229454.000000000313D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: pWjI78htpJ4.exe, 00000010.00000002.3731547549.0000000002DAC000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.besttreasurespot.shop
                Source: pWjI78htpJ4.exe, 00000010.00000002.3731547549.0000000002DAC000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.besttreasurespot.shop/xvk7/
                Source: runonce.exe, 0000000F.00000002.3732343518.00000000068D4000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.00000000042D4000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://35.241.104.76:36189
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: powershell.exe, 00000000.00000002.1252079445.00000000051B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: powershell.exe, 00000000.00000002.1252079445.0000000005306000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1251229454.000000000313D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: runonce.exe, 0000000F.00000002.3732343518.00000000068D4000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.00000000042D4000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://hm.baidu.com/hm.js?90db264d7e53e8281dc001cee11cc24b
                Source: runonce.exe, 0000000F.00000002.3728763168.0000000003659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: runonce.exe, 0000000F.00000002.3728763168.0000000003659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: runonce.exe, 0000000F.00000002.3728763168.0000000003659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: runonce.exe, 0000000F.00000002.3728763168.0000000003659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033=
                Source: runonce.exe, 0000000F.00000002.3728763168.0000000003659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: runonce.exe, 0000000F.00000002.3728763168.0000000003659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: runonce.exe, 0000000F.00000003.1920050330.00000000084FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: runonce.exe, 0000000F.00000002.3732343518.0000000006F1C000.00000004.10000000.00040000.00000000.sdmp, runonce.exe, 0000000F.00000002.3734099857.0000000008270000.00000004.00000800.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3732343518.0000000006D8A000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.000000000491C000.00000004.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.000000000478A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: runonce.exe, 0000000F.00000003.1925769242.0000000008509000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: runonce.exe, 0000000F.00000002.3732343518.0000000006BF8000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.00000000045F8000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.nmw365.xyz
                Source: pWjI78htpJ4.exe, 00000010.00000002.3732048521.0000000003FB0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.partflix.net/djyl/?jLKPrvv=x4UYXwVOLjDEdQDRDI
                Source: pWjI78htpJ4.exe, 00000010.00000002.3732048521.00000000037D6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.seasay.xyz/c9ts/?jLKPrvv=b2h4705j/BXuiRKtB3JtAMBCvYzPFBfMqHSZnAN25/qy/QtrNwJS7WfSSjTsExA
                Source: runonce.exe, 0000000F.00000002.3732343518.0000000005C44000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.0000000003644000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.2032540100.00000000169E4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&amp;topId=86884/vhr7/
                Source: runonce.exe, 0000000F.00000002.3732343518.0000000005C44000.00000004.10000000.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000002.3732048521.0000000003644000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.2032540100.00000000169E4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&topId=86884/vhr7/

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1733946439.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.3731547549.0000000002D40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3731493934.0000000004ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3727855592.00000000035E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3719515035.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1733243869.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3731500134.0000000002CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1735711958.00000000034B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: Process Memory Space: powershell.exe PID: 6752, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: x.exe.0.drStatic PE information: section name: qC?Cd22O
                Source: x.exe.0.drStatic PE information: section name:
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0042CAA3 NtClose,6_2_0042CAA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2B60 NtClose,LdrInitializeThunk,6_2_031D2B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_031D2DF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_031D2C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D35C0 NtCreateMutant,LdrInitializeThunk,6_2_031D35C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D4340 NtSetContextThread,6_2_031D4340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D4650 NtSuspendThread,6_2_031D4650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2B80 NtQueryInformationFile,6_2_031D2B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2BA0 NtEnumerateValueKey,6_2_031D2BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2BF0 NtAllocateVirtualMemory,6_2_031D2BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2BE0 NtQueryValueKey,6_2_031D2BE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2AB0 NtWaitForSingleObject,6_2_031D2AB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2AD0 NtReadFile,6_2_031D2AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2AF0 NtWriteFile,6_2_031D2AF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2F30 NtCreateSection,6_2_031D2F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2F60 NtCreateProcessEx,6_2_031D2F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2F90 NtProtectVirtualMemory,6_2_031D2F90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2FB0 NtResumeThread,6_2_031D2FB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2FA0 NtQuerySection,6_2_031D2FA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2FE0 NtCreateFile,6_2_031D2FE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2E30 NtWriteVirtualMemory,6_2_031D2E30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2E80 NtReadVirtualMemory,6_2_031D2E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2EA0 NtAdjustPrivilegesToken,6_2_031D2EA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2EE0 NtQueueApcThread,6_2_031D2EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2D10 NtMapViewOfSection,6_2_031D2D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2D00 NtSetInformationFile,6_2_031D2D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2D30 NtUnmapViewOfSection,6_2_031D2D30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2DB0 NtEnumerateKey,6_2_031D2DB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2DD0 NtDelayExecution,6_2_031D2DD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2C00 NtQueryInformationProcess,6_2_031D2C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2C60 NtCreateKey,6_2_031D2C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2CA0 NtQueryInformationToken,6_2_031D2CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2CC0 NtQueryVirtualMemory,6_2_031D2CC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2CF0 NtOpenProcess,6_2_031D2CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D3010 NtOpenDirectoryObject,6_2_031D3010
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D3090 NtSetValueKey,6_2_031D3090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D39B0 NtGetContextThread,6_2_031D39B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D3D10 NtOpenProcessToken,6_2_031D3D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D3D70 NtOpenThread,6_2_031D3D70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A4650 NtSuspendThread,LdrInitializeThunk,15_2_052A4650
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A4340 NtSetContextThread,LdrInitializeThunk,15_2_052A4340
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2D30 NtUnmapViewOfSection,LdrInitializeThunk,15_2_052A2D30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2D10 NtMapViewOfSection,LdrInitializeThunk,15_2_052A2D10
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2DF0 NtQuerySystemInformation,LdrInitializeThunk,15_2_052A2DF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2DD0 NtDelayExecution,LdrInitializeThunk,15_2_052A2DD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2C60 NtCreateKey,LdrInitializeThunk,15_2_052A2C60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2C70 NtFreeVirtualMemory,LdrInitializeThunk,15_2_052A2C70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2CA0 NtQueryInformationToken,LdrInitializeThunk,15_2_052A2CA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2F30 NtCreateSection,LdrInitializeThunk,15_2_052A2F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2FB0 NtResumeThread,LdrInitializeThunk,15_2_052A2FB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2FE0 NtCreateFile,LdrInitializeThunk,15_2_052A2FE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2E80 NtReadVirtualMemory,LdrInitializeThunk,15_2_052A2E80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2EE0 NtQueueApcThread,LdrInitializeThunk,15_2_052A2EE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2B60 NtClose,LdrInitializeThunk,15_2_052A2B60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2BA0 NtEnumerateValueKey,LdrInitializeThunk,15_2_052A2BA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2BE0 NtQueryValueKey,LdrInitializeThunk,15_2_052A2BE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,15_2_052A2BF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2AF0 NtWriteFile,LdrInitializeThunk,15_2_052A2AF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2AD0 NtReadFile,LdrInitializeThunk,15_2_052A2AD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A35C0 NtCreateMutant,LdrInitializeThunk,15_2_052A35C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A39B0 NtGetContextThread,LdrInitializeThunk,15_2_052A39B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2D00 NtSetInformationFile,15_2_052A2D00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2DB0 NtEnumerateKey,15_2_052A2DB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2C00 NtQueryInformationProcess,15_2_052A2C00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2CF0 NtOpenProcess,15_2_052A2CF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2CC0 NtQueryVirtualMemory,15_2_052A2CC0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2F60 NtCreateProcessEx,15_2_052A2F60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2FA0 NtQuerySection,15_2_052A2FA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2F90 NtProtectVirtualMemory,15_2_052A2F90
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2E30 NtWriteVirtualMemory,15_2_052A2E30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2EA0 NtAdjustPrivilegesToken,15_2_052A2EA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2B80 NtQueryInformationFile,15_2_052A2B80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A2AB0 NtWaitForSingleObject,15_2_052A2AB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A3010 NtOpenDirectoryObject,15_2_052A3010
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A3090 NtSetValueKey,15_2_052A3090
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A3D10 NtOpenProcessToken,15_2_052A3D10
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A3D70 NtOpenThread,15_2_052A3D70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_03229780 NtDeleteFile,15_2_03229780
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_03229680 NtReadFile,15_2_03229680
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_03229510 NtCreateFile,15_2_03229510
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_03229980 NtAllocateVirtualMemory,15_2_03229980
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_03229820 NtClose,15_2_03229820
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_04FDF2CF NtReadVirtualMemory,15_2_04FDF2CF
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_04FDF8C4 NtMapViewOfSection,15_2_04FDF8C4
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013411E04_2_013411E0
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013408484_2_01340848
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013428D04_2_013428D0
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013407E34_2_013407E3
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013407D34_2_013407D3
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013407C14_2_013407C1
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013428C14_2_013428C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004188F36_2_004188F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004030006_2_00403000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004100CA6_2_004100CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0042F0D36_2_0042F0D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004100D36_2_004100D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004012406_2_00401240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040E2E36_2_0040E2E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004102F36_2_004102F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00416AFE6_2_00416AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00416B036_2_00416B03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004024626_2_00402462
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004024706_2_00402470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040E47C6_2_0040E47C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040E4276_2_0040E427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040E4336_2_0040E433
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004027506_2_00402750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325A3526_2_0325A352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032603E66_2_032603E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE3F06_2_031AE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032402746_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032202C06_2_032202C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031901006_2_03190100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323A1186_2_0323A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032281586_2_03228158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032541A26_2_032541A2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032601AA6_2_032601AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032581CC6_2_032581CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032320006_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C47506_2_031C4750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A07706_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319C7C06_2_0319C7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BC6E06_2_031BC6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A05356_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032605916_2_03260591
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032444206_2_03244420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032524466_2_03252446
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324E4F66_2_0324E4F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325AB406_2_0325AB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03256BD76_2_03256BD7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA806_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B69626_2_031B6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0326A9A66_2_0326A9A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A06_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A28406_2_031A2840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AA8406_2_031AA840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031868B86_2_031868B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE8F06_2_031CE8F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03242F306_2_03242F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C0F306_2_031C0F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E2F286_2_031E2F28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03214F406_2_03214F40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321EFA06_2_0321EFA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031ACFE06_2_031ACFE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325EE266_2_0325EE26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0E596_2_031A0E59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2E906_2_031B2E90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325CE936_2_0325CE93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325EEDB6_2_0325EEDB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AAD006_2_031AAD00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323CD1F6_2_0323CD1F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B8DBF6_2_031B8DBF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319ADE06_2_0319ADE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0C006_2_031A0C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240CB56_2_03240CB5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190CF26_2_03190CF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325132D6_2_0325132D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318D34C6_2_0318D34C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E739A6_2_031E739A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A52A06_2_031A52A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032412ED6_2_032412ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BB2C06_2_031BB2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0326B16B6_2_0326B16B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318F1726_2_0318F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D516C6_2_031D516C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AB1B06_2_031AB1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325F0E06_2_0325F0E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032570E96_2_032570E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A70C06_2_031A70C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324F0CC6_2_0324F0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325F7B06_2_0325F7B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E56306_2_031E5630
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032516CC6_2_032516CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032575716_2_03257571
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323D5B06_2_0323D5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032695C36_2_032695C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325F43F6_2_0325F43F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031914606_2_03191460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325FB766_2_0325FB76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BFB806_2_031BFB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03215BF06_2_03215BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031DDBF96_2_031DDBF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03213A6C6_2_03213A6C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03257A466_2_03257A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325FA496_2_0325FA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03241AA36_2_03241AA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323DAAC6_2_0323DAAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E5AA06_2_031E5AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324DAC66_2_0324DAC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032359106_2_03235910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A99506_2_031A9950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BB9506_2_031BB950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320D8006_2_0320D800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A38E06_2_031A38E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325FF096_2_0325FF09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A1F926_2_031A1F92
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325FFB16_2_0325FFB1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03163FD56_2_03163FD5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03163FD26_2_03163FD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A9EB06_2_031A9EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03257D736_2_03257D73
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A3D406_2_031A3D40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03251D5A6_2_03251D5A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BFDC06_2_031BFDC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03219C326_2_03219C32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325FCF26_2_0325FCF2
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA9A6914_2_02FA9A69
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FB22E214_2_02FB22E2
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FB22E714_2_02FB22E7
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FABAD714_2_02FABAD7
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA9AC714_2_02FA9AC7
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FB40D614_2_02FB40D6
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FCA8B714_2_02FCA8B7
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FAB8B714_2_02FAB8B7
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FAB8AE14_2_02FAB8AE
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA9C6014_2_02FA9C60
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA9C1714_2_02FA9C17
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA9C0B14_2_02FA9C0B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527053515_2_05270535
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0533059115_2_05330591
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0531442015_2_05314420
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532244615_2_05322446
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0531E4F615_2_0531E4F6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527077015_2_05270770
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0529475015_2_05294750
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0526C7C015_2_0526C7C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0528C6E015_2_0528C6E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0526010015_2_05260100
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0530A11815_2_0530A118
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052F815815_2_052F8158
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053241A215_2_053241A2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053301AA15_2_053301AA
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053281CC15_2_053281CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0530200015_2_05302000
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532A35215_2_0532A352
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053303E615_2_053303E6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527E3F015_2_0527E3F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0531027415_2_05310274
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052F02C015_2_052F02C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527AD0015_2_0527AD00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0530CD1F15_2_0530CD1F
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05288DBF15_2_05288DBF
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0526ADE015_2_0526ADE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05270C0015_2_05270C00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05310CB515_2_05310CB5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05260CF215_2_05260CF2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05312F3015_2_05312F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052B2F2815_2_052B2F28
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05290F3015_2_05290F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052E4F4015_2_052E4F40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052EEFA015_2_052EEFA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527CFE015_2_0527CFE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05262FC815_2_05262FC8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532EE2615_2_0532EE26
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05270E5915_2_05270E59
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532CE9315_2_0532CE93
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05282E9015_2_05282E90
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532EEDB15_2_0532EEDB
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0528696215_2_05286962
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052729A015_2_052729A0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0533A9A615_2_0533A9A6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527284015_2_05272840
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527A84015_2_0527A840
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052568B815_2_052568B8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0529E8F015_2_0529E8F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532AB4015_2_0532AB40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05326BD715_2_05326BD7
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0526EA8015_2_0526EA80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532757115_2_05327571
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0530D5B015_2_0530D5B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053395C315_2_053395C3
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532F43F15_2_0532F43F
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0526146015_2_05261460
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532F7B015_2_0532F7B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052B563015_2_052B5630
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053216CC15_2_053216CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052A516C15_2_052A516C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0525F17215_2_0525F172
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0533B16B15_2_0533B16B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527B1B015_2_0527B1B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532F0E015_2_0532F0E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053270E915_2_053270E9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052770C015_2_052770C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0531F0CC15_2_0531F0CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532132D15_2_0532132D
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0525D34C15_2_0525D34C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052B739A15_2_052B739A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052752A015_2_052752A0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_053112ED15_2_053112ED
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0528B2C015_2_0528B2C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05327D7315_2_05327D73
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05273D4015_2_05273D40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05321D5A15_2_05321D5A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0528FDC015_2_0528FDC0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052E9C3215_2_052E9C32
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532FCF215_2_0532FCF2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532FF0915_2_0532FF09
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532FFB115_2_0532FFB1
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05271F9215_2_05271F92
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05233FD215_2_05233FD2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05233FD515_2_05233FD5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05279EB015_2_05279EB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0530591015_2_05305910
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0527995015_2_05279950
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0528B95015_2_0528B950
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052DD80015_2_052DD800
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052738E015_2_052738E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532FB7615_2_0532FB76
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0528FB8015_2_0528FB80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052ADBF915_2_052ADBF9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052E5BF015_2_052E5BF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052E3A6C15_2_052E3A6C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05327A4615_2_05327A46
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0532FA4915_2_0532FA49
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052B5AA015_2_052B5AA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_05311AA315_2_05311AA3
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0530DAAC15_2_0530DAAC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0531DAC615_2_0531DAC6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_03211FD015_2_03211FD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320CE4715_2_0320CE47
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320CE5015_2_0320CE50
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320B1A415_2_0320B1A4
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320B1B015_2_0320B1B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320B1F915_2_0320B1F9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320B06015_2_0320B060
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0320D07015_2_0320D070
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0321567015_2_03215670
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0321387B15_2_0321387B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0321388015_2_03213880
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0322BE5015_2_0322BE50
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_04FDE46715_2_04FDE467
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_04FDE7FC15_2_04FDE7FC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_04FDD8C815_2_04FDD8C8
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6920316_2_02D69203
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D8820316_2_02D88203
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D71A2316_2_02D71A23
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6E38316_2_02D6E383
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D691FA16_2_02D691FA
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6741316_2_02D67413
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6FC3316_2_02D6FC33
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6942316_2_02D69423
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6FC2E16_2_02D6FC2E
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D675AC16_2_02D675AC
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6755716_2_02D67557
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 16_2_02D6756316_2_02D67563
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\x.exe F2A70161F72F69FEF1F7D96C7773A5B670B26BF16BC62D4E42F4416F335AF8D6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0320EA12 appears 86 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 031E7E54 appears 111 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0318B970 appears 277 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 031D5130 appears 58 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0321F290 appears 105 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 052DEA12 appears 86 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 052B7E54 appears 111 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 0525B970 appears 277 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 052A5130 appears 58 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 052EF290 appears 105 times
                Source: Process Memory Space: powershell.exe PID: 6752, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: x.exe.0.drStatic PE information: Section: qC?Cd22O ZLIB complexity 1.0003320970117846
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winPS1@13/8@16/12
                Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\x.exe.logJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2436:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yublb3q3.vpe.ps1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: runonce.exe, 0000000F.00000002.3728763168.00000000036BA000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1921244375.0000000003699000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1921373639.00000000036BA000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1923517362.00000000036C2000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3728763168.00000000036E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: laser (2).ps1Virustotal: Detection: 49%
                Source: laser (2).ps1ReversingLabs: Detection: 40%
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\laser (2).ps1"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\laser (2).ps1"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user~1\AppData\Local\Temp\x.exe"
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user~1\AppData\Local\Temp\x.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: Binary string: CVZXCVHDF.pdb source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000004.00000000.1249155312.0000000000C5E000.00000002.00000001.01000000.0000000A.sdmp, x.exe.0.dr
                Source: Binary string: runonce.pdbGCTL source: pWjI78htpJ4.exe, 0000000E.00000002.3729154264.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: RegAsm.exe, 00000006.00000002.1734135960.0000000003160000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3731805345.00000000053CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3731805345.0000000005230000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1733521819.0000000004ED3000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1735774636.0000000005086000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 00000006.00000002.1734135960.0000000003160000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, runonce.exe, 0000000F.00000002.3731805345.00000000053CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000002.3731805345.0000000005230000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1733521819.0000000004ED3000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 0000000F.00000003.1735774636.0000000005086000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: CVZXCVHDF.pdb\ source: powershell.exe, 00000000.00000002.1265979436.000000000621D000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000004.00000000.1249155312.0000000000C5E000.00000002.00000001.01000000.0000000A.sdmp, x.exe.0.dr
                Source: Binary string: runonce.pdb source: pWjI78htpJ4.exe, 0000000E.00000002.3729154264.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: pWjI78htpJ4.exe, 0000000E.00000002.3720605673.00000000006EF000.00000002.00000001.01000000.0000000C.sdmp, pWjI78htpJ4.exe, 00000010.00000000.1800564375.00000000006EF000.00000002.00000001.01000000.0000000C.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEFAM
                Source: x.exe.0.drStatic PE information: 0xD267DCCE [Mon Nov 10 17:41:34 2081 UTC]
                Source: x.exe.0.drStatic PE information: section name: qC?Cd22O
                Source: x.exe.0.drStatic PE information: section name:
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_071F5428 push esp; retf 0_2_071F5431
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0041F04F push ebx; ret 6_2_0041F058
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00403280 push eax; ret 6_2_00403282
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0041AB61 pushfd ; ret 6_2_0041AB78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0041ABD6 push ds; ret 6_2_0041ABD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0040D38A push edx; iretd 6_2_0040D453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00426CC3 pushad ; iretd 6_2_00426CEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004084DA push esi; retf 6_2_004084DD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004084FF push ebp; iretd 6_2_00408502
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00412559 push ecx; iretd 6_2_0041255A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_004125DC pushfd ; iretd 6_2_004125FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00413E59 push 2C1D344Fh; ret 6_2_00413E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00405E25 push ecx; ret 6_2_00405E2B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00401F0E push ss; retf 6_2_00401F14
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0316225F pushad ; ret 6_2_031627F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031627FA pushad ; ret 6_2_031627F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031909AD push ecx; mov dword ptr [esp], ecx6_2_031909B6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0316283D push eax; iretd 6_2_03162858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03161368 push eax; iretd 6_2_03161369
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FB63BA push ds; ret 14_2_02FB63BC
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA8B6E push edx; iretd 14_2_02FA8C37
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FB6345 pushfd ; ret 14_2_02FB635C
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FAF63D push 2C1D344Fh; ret 14_2_02FAF644
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA1609 push ecx; ret 14_2_02FA160F
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA3CE3 push ebp; iretd 14_2_02FA3CE6
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FB1CCB push eax; ret 14_2_02FB1CD7
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FA3CBE push esi; retf 14_2_02FA3CC1
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FADDC0 pushfd ; iretd 14_2_02FADDDF
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeCode function: 14_2_02FADD3D push ecx; iretd 14_2_02FADD3E
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_052327FA pushad ; ret 15_2_052327F9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0523225F pushad ; ret 15_2_052327F9
                Source: x.exe.0.drStatic PE information: section name: qC?Cd22O entropy: 7.9993331420681155
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECD7E4
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECD944
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECD504
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECD544
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 1340000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 3000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 5000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 56D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 66D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 7800000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D096E rdtsc 6_2_031D096E
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2530Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 662Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeWindow / User API: threadDelayed 9842Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 0.8 %
                Source: C:\Windows\SysWOW64\runonce.exeAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1412Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2716Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 7160Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 1860Thread sleep count: 131 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 1860Thread sleep time: -262000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 1860Thread sleep count: 9842 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 1860Thread sleep time: -19684000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe TID: 316Thread sleep time: -75000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe TID: 316Thread sleep count: 37 > 30Jump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe TID: 316Thread sleep time: -55500s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe TID: 316Thread sleep count: 38 > 30Jump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe TID: 316Thread sleep time: -38000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\runonce.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 15_2_0321C8D0 FindFirstFileW,FindNextFileW,FindClose,15_2_0321C8D0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: 6511-iOQ--.15.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: 6511-iOQ--.15.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: 6511-iOQ--.15.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: AMC password management pageVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: 6511-iOQ--.15.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: 6511-iOQ--.15.drBinary or memory string: discord.comVMware20,11696492231f
                Source: runonce.exe, 0000000F.00000002.3728763168.000000000364A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.2033859955.0000021BD65FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 6511-iOQ--.15.drBinary or memory string: global block list test formVMware20,11696492231
                Source: pWjI78htpJ4.exe, 00000010.00000002.3730610479.00000000013C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                Source: 6511-iOQ--.15.drBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: 6511-iOQ--.15.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: 6511-iOQ--.15.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: 6511-iOQ--.15.drBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: 6511-iOQ--.15.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: 6511-iOQ--.15.drBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: 6511-iOQ--.15.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: 6511-iOQ--.15.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: 6511-iOQ--.15.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: 6511-iOQ--.15.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: 6511-iOQ--.15.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: 6511-iOQ--.15.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D096E rdtsc 6_2_031D096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00417A93 LdrLoadDll,6_2_00417A93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03268324 mov eax, dword ptr fs:[00000030h]6_2_03268324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03268324 mov ecx, dword ptr fs:[00000030h]6_2_03268324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03268324 mov eax, dword ptr fs:[00000030h]6_2_03268324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03268324 mov eax, dword ptr fs:[00000030h]6_2_03268324
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318C310 mov ecx, dword ptr fs:[00000030h]6_2_0318C310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B0310 mov ecx, dword ptr fs:[00000030h]6_2_031B0310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA30B mov eax, dword ptr fs:[00000030h]6_2_031CA30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA30B mov eax, dword ptr fs:[00000030h]6_2_031CA30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA30B mov eax, dword ptr fs:[00000030h]6_2_031CA30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323437C mov eax, dword ptr fs:[00000030h]6_2_0323437C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03212349 mov eax, dword ptr fs:[00000030h]6_2_03212349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0326634F mov eax, dword ptr fs:[00000030h]6_2_0326634F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03238350 mov ecx, dword ptr fs:[00000030h]6_2_03238350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325A352 mov eax, dword ptr fs:[00000030h]6_2_0325A352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321035C mov eax, dword ptr fs:[00000030h]6_2_0321035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321035C mov eax, dword ptr fs:[00000030h]6_2_0321035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321035C mov eax, dword ptr fs:[00000030h]6_2_0321035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321035C mov ecx, dword ptr fs:[00000030h]6_2_0321035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321035C mov eax, dword ptr fs:[00000030h]6_2_0321035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321035C mov eax, dword ptr fs:[00000030h]6_2_0321035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03188397 mov eax, dword ptr fs:[00000030h]6_2_03188397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03188397 mov eax, dword ptr fs:[00000030h]6_2_03188397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03188397 mov eax, dword ptr fs:[00000030h]6_2_03188397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318E388 mov eax, dword ptr fs:[00000030h]6_2_0318E388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318E388 mov eax, dword ptr fs:[00000030h]6_2_0318E388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318E388 mov eax, dword ptr fs:[00000030h]6_2_0318E388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B438F mov eax, dword ptr fs:[00000030h]6_2_031B438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B438F mov eax, dword ptr fs:[00000030h]6_2_031B438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A3C0 mov eax, dword ptr fs:[00000030h]6_2_0319A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A3C0 mov eax, dword ptr fs:[00000030h]6_2_0319A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A3C0 mov eax, dword ptr fs:[00000030h]6_2_0319A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A3C0 mov eax, dword ptr fs:[00000030h]6_2_0319A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A3C0 mov eax, dword ptr fs:[00000030h]6_2_0319A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A3C0 mov eax, dword ptr fs:[00000030h]6_2_0319A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031983C0 mov eax, dword ptr fs:[00000030h]6_2_031983C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031983C0 mov eax, dword ptr fs:[00000030h]6_2_031983C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031983C0 mov eax, dword ptr fs:[00000030h]6_2_031983C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031983C0 mov eax, dword ptr fs:[00000030h]6_2_031983C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032163C0 mov eax, dword ptr fs:[00000030h]6_2_032163C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C63FF mov eax, dword ptr fs:[00000030h]6_2_031C63FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324C3CD mov eax, dword ptr fs:[00000030h]6_2_0324C3CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE3F0 mov eax, dword ptr fs:[00000030h]6_2_031AE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE3F0 mov eax, dword ptr fs:[00000030h]6_2_031AE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE3F0 mov eax, dword ptr fs:[00000030h]6_2_031AE3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A03E9 mov eax, dword ptr fs:[00000030h]6_2_031A03E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032343D4 mov eax, dword ptr fs:[00000030h]6_2_032343D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032343D4 mov eax, dword ptr fs:[00000030h]6_2_032343D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E3DB mov eax, dword ptr fs:[00000030h]6_2_0323E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E3DB mov eax, dword ptr fs:[00000030h]6_2_0323E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E3DB mov ecx, dword ptr fs:[00000030h]6_2_0323E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E3DB mov eax, dword ptr fs:[00000030h]6_2_0323E3DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318823B mov eax, dword ptr fs:[00000030h]6_2_0318823B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196259 mov eax, dword ptr fs:[00000030h]6_2_03196259
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318A250 mov eax, dword ptr fs:[00000030h]6_2_0318A250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03240274 mov eax, dword ptr fs:[00000030h]6_2_03240274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03218243 mov eax, dword ptr fs:[00000030h]6_2_03218243
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03218243 mov ecx, dword ptr fs:[00000030h]6_2_03218243
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318826B mov eax, dword ptr fs:[00000030h]6_2_0318826B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324A250 mov eax, dword ptr fs:[00000030h]6_2_0324A250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324A250 mov eax, dword ptr fs:[00000030h]6_2_0324A250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194260 mov eax, dword ptr fs:[00000030h]6_2_03194260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194260 mov eax, dword ptr fs:[00000030h]6_2_03194260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194260 mov eax, dword ptr fs:[00000030h]6_2_03194260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0326625D mov eax, dword ptr fs:[00000030h]6_2_0326625D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032262A0 mov eax, dword ptr fs:[00000030h]6_2_032262A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032262A0 mov ecx, dword ptr fs:[00000030h]6_2_032262A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032262A0 mov eax, dword ptr fs:[00000030h]6_2_032262A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032262A0 mov eax, dword ptr fs:[00000030h]6_2_032262A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032262A0 mov eax, dword ptr fs:[00000030h]6_2_032262A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032262A0 mov eax, dword ptr fs:[00000030h]6_2_032262A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE284 mov eax, dword ptr fs:[00000030h]6_2_031CE284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE284 mov eax, dword ptr fs:[00000030h]6_2_031CE284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03210283 mov eax, dword ptr fs:[00000030h]6_2_03210283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03210283 mov eax, dword ptr fs:[00000030h]6_2_03210283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03210283 mov eax, dword ptr fs:[00000030h]6_2_03210283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A02A0 mov eax, dword ptr fs:[00000030h]6_2_031A02A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A02A0 mov eax, dword ptr fs:[00000030h]6_2_031A02A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A2C3 mov eax, dword ptr fs:[00000030h]6_2_0319A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A2C3 mov eax, dword ptr fs:[00000030h]6_2_0319A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A2C3 mov eax, dword ptr fs:[00000030h]6_2_0319A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A2C3 mov eax, dword ptr fs:[00000030h]6_2_0319A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A2C3 mov eax, dword ptr fs:[00000030h]6_2_0319A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032662D6 mov eax, dword ptr fs:[00000030h]6_2_032662D6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A02E1 mov eax, dword ptr fs:[00000030h]6_2_031A02E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A02E1 mov eax, dword ptr fs:[00000030h]6_2_031A02E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A02E1 mov eax, dword ptr fs:[00000030h]6_2_031A02E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov eax, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov ecx, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov eax, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov eax, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov ecx, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov eax, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov eax, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov ecx, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov eax, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323E10E mov ecx, dword ptr fs:[00000030h]6_2_0323E10E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03250115 mov eax, dword ptr fs:[00000030h]6_2_03250115
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C0124 mov eax, dword ptr fs:[00000030h]6_2_031C0124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323A118 mov ecx, dword ptr fs:[00000030h]6_2_0323A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323A118 mov eax, dword ptr fs:[00000030h]6_2_0323A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323A118 mov eax, dword ptr fs:[00000030h]6_2_0323A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323A118 mov eax, dword ptr fs:[00000030h]6_2_0323A118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264164 mov eax, dword ptr fs:[00000030h]6_2_03264164
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264164 mov eax, dword ptr fs:[00000030h]6_2_03264164
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196154 mov eax, dword ptr fs:[00000030h]6_2_03196154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196154 mov eax, dword ptr fs:[00000030h]6_2_03196154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318C156 mov eax, dword ptr fs:[00000030h]6_2_0318C156
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03224144 mov eax, dword ptr fs:[00000030h]6_2_03224144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03224144 mov eax, dword ptr fs:[00000030h]6_2_03224144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03224144 mov ecx, dword ptr fs:[00000030h]6_2_03224144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03224144 mov eax, dword ptr fs:[00000030h]6_2_03224144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03224144 mov eax, dword ptr fs:[00000030h]6_2_03224144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03228158 mov eax, dword ptr fs:[00000030h]6_2_03228158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318A197 mov eax, dword ptr fs:[00000030h]6_2_0318A197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318A197 mov eax, dword ptr fs:[00000030h]6_2_0318A197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318A197 mov eax, dword ptr fs:[00000030h]6_2_0318A197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D0185 mov eax, dword ptr fs:[00000030h]6_2_031D0185
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03234180 mov eax, dword ptr fs:[00000030h]6_2_03234180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03234180 mov eax, dword ptr fs:[00000030h]6_2_03234180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324C188 mov eax, dword ptr fs:[00000030h]6_2_0324C188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324C188 mov eax, dword ptr fs:[00000030h]6_2_0324C188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321019F mov eax, dword ptr fs:[00000030h]6_2_0321019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321019F mov eax, dword ptr fs:[00000030h]6_2_0321019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321019F mov eax, dword ptr fs:[00000030h]6_2_0321019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321019F mov eax, dword ptr fs:[00000030h]6_2_0321019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032661E5 mov eax, dword ptr fs:[00000030h]6_2_032661E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C01F8 mov eax, dword ptr fs:[00000030h]6_2_031C01F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032561C3 mov eax, dword ptr fs:[00000030h]6_2_032561C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032561C3 mov eax, dword ptr fs:[00000030h]6_2_032561C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E1D0 mov eax, dword ptr fs:[00000030h]6_2_0320E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E1D0 mov eax, dword ptr fs:[00000030h]6_2_0320E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E1D0 mov ecx, dword ptr fs:[00000030h]6_2_0320E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E1D0 mov eax, dword ptr fs:[00000030h]6_2_0320E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E1D0 mov eax, dword ptr fs:[00000030h]6_2_0320E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE016 mov eax, dword ptr fs:[00000030h]6_2_031AE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE016 mov eax, dword ptr fs:[00000030h]6_2_031AE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE016 mov eax, dword ptr fs:[00000030h]6_2_031AE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE016 mov eax, dword ptr fs:[00000030h]6_2_031AE016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03226030 mov eax, dword ptr fs:[00000030h]6_2_03226030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03214000 mov ecx, dword ptr fs:[00000030h]6_2_03214000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03232000 mov eax, dword ptr fs:[00000030h]6_2_03232000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318A020 mov eax, dword ptr fs:[00000030h]6_2_0318A020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318C020 mov eax, dword ptr fs:[00000030h]6_2_0318C020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03192050 mov eax, dword ptr fs:[00000030h]6_2_03192050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BC073 mov eax, dword ptr fs:[00000030h]6_2_031BC073
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216050 mov eax, dword ptr fs:[00000030h]6_2_03216050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032280A8 mov eax, dword ptr fs:[00000030h]6_2_032280A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319208A mov eax, dword ptr fs:[00000030h]6_2_0319208A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032560B8 mov eax, dword ptr fs:[00000030h]6_2_032560B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032560B8 mov ecx, dword ptr fs:[00000030h]6_2_032560B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031880A0 mov eax, dword ptr fs:[00000030h]6_2_031880A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032160E0 mov eax, dword ptr fs:[00000030h]6_2_032160E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318C0F0 mov eax, dword ptr fs:[00000030h]6_2_0318C0F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D20F0 mov ecx, dword ptr fs:[00000030h]6_2_031D20F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031980E9 mov eax, dword ptr fs:[00000030h]6_2_031980E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318A0E3 mov ecx, dword ptr fs:[00000030h]6_2_0318A0E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032120DE mov eax, dword ptr fs:[00000030h]6_2_032120DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190710 mov eax, dword ptr fs:[00000030h]6_2_03190710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C0710 mov eax, dword ptr fs:[00000030h]6_2_031C0710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320C730 mov eax, dword ptr fs:[00000030h]6_2_0320C730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CC700 mov eax, dword ptr fs:[00000030h]6_2_031CC700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C273C mov eax, dword ptr fs:[00000030h]6_2_031C273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C273C mov ecx, dword ptr fs:[00000030h]6_2_031C273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C273C mov eax, dword ptr fs:[00000030h]6_2_031C273C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CC720 mov eax, dword ptr fs:[00000030h]6_2_031CC720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CC720 mov eax, dword ptr fs:[00000030h]6_2_031CC720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190750 mov eax, dword ptr fs:[00000030h]6_2_03190750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2750 mov eax, dword ptr fs:[00000030h]6_2_031D2750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2750 mov eax, dword ptr fs:[00000030h]6_2_031D2750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C674D mov esi, dword ptr fs:[00000030h]6_2_031C674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C674D mov eax, dword ptr fs:[00000030h]6_2_031C674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C674D mov eax, dword ptr fs:[00000030h]6_2_031C674D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198770 mov eax, dword ptr fs:[00000030h]6_2_03198770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0770 mov eax, dword ptr fs:[00000030h]6_2_031A0770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03214755 mov eax, dword ptr fs:[00000030h]6_2_03214755
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321E75D mov eax, dword ptr fs:[00000030h]6_2_0321E75D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032447A0 mov eax, dword ptr fs:[00000030h]6_2_032447A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323678E mov eax, dword ptr fs:[00000030h]6_2_0323678E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031907AF mov eax, dword ptr fs:[00000030h]6_2_031907AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321E7E1 mov eax, dword ptr fs:[00000030h]6_2_0321E7E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319C7C0 mov eax, dword ptr fs:[00000030h]6_2_0319C7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032107C3 mov eax, dword ptr fs:[00000030h]6_2_032107C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031947FB mov eax, dword ptr fs:[00000030h]6_2_031947FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031947FB mov eax, dword ptr fs:[00000030h]6_2_031947FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B27ED mov eax, dword ptr fs:[00000030h]6_2_031B27ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B27ED mov eax, dword ptr fs:[00000030h]6_2_031B27ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B27ED mov eax, dword ptr fs:[00000030h]6_2_031B27ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D2619 mov eax, dword ptr fs:[00000030h]6_2_031D2619
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A260B mov eax, dword ptr fs:[00000030h]6_2_031A260B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E609 mov eax, dword ptr fs:[00000030h]6_2_0320E609
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319262C mov eax, dword ptr fs:[00000030h]6_2_0319262C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C6620 mov eax, dword ptr fs:[00000030h]6_2_031C6620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C8620 mov eax, dword ptr fs:[00000030h]6_2_031C8620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AE627 mov eax, dword ptr fs:[00000030h]6_2_031AE627
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325866E mov eax, dword ptr fs:[00000030h]6_2_0325866E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325866E mov eax, dword ptr fs:[00000030h]6_2_0325866E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031AC640 mov eax, dword ptr fs:[00000030h]6_2_031AC640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C2674 mov eax, dword ptr fs:[00000030h]6_2_031C2674
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA660 mov eax, dword ptr fs:[00000030h]6_2_031CA660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA660 mov eax, dword ptr fs:[00000030h]6_2_031CA660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194690 mov eax, dword ptr fs:[00000030h]6_2_03194690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194690 mov eax, dword ptr fs:[00000030h]6_2_03194690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C66B0 mov eax, dword ptr fs:[00000030h]6_2_031C66B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CC6A6 mov eax, dword ptr fs:[00000030h]6_2_031CC6A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032106F1 mov eax, dword ptr fs:[00000030h]6_2_032106F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032106F1 mov eax, dword ptr fs:[00000030h]6_2_032106F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E6F2 mov eax, dword ptr fs:[00000030h]6_2_0320E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E6F2 mov eax, dword ptr fs:[00000030h]6_2_0320E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E6F2 mov eax, dword ptr fs:[00000030h]6_2_0320E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E6F2 mov eax, dword ptr fs:[00000030h]6_2_0320E6F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA6C7 mov ebx, dword ptr fs:[00000030h]6_2_031CA6C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA6C7 mov eax, dword ptr fs:[00000030h]6_2_031CA6C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03226500 mov eax, dword ptr fs:[00000030h]6_2_03226500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE53E mov eax, dword ptr fs:[00000030h]6_2_031BE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE53E mov eax, dword ptr fs:[00000030h]6_2_031BE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE53E mov eax, dword ptr fs:[00000030h]6_2_031BE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE53E mov eax, dword ptr fs:[00000030h]6_2_031BE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE53E mov eax, dword ptr fs:[00000030h]6_2_031BE53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264500 mov eax, dword ptr fs:[00000030h]6_2_03264500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0535 mov eax, dword ptr fs:[00000030h]6_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0535 mov eax, dword ptr fs:[00000030h]6_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0535 mov eax, dword ptr fs:[00000030h]6_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0535 mov eax, dword ptr fs:[00000030h]6_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0535 mov eax, dword ptr fs:[00000030h]6_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0535 mov eax, dword ptr fs:[00000030h]6_2_031A0535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198550 mov eax, dword ptr fs:[00000030h]6_2_03198550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198550 mov eax, dword ptr fs:[00000030h]6_2_03198550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C656A mov eax, dword ptr fs:[00000030h]6_2_031C656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C656A mov eax, dword ptr fs:[00000030h]6_2_031C656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C656A mov eax, dword ptr fs:[00000030h]6_2_031C656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE59C mov eax, dword ptr fs:[00000030h]6_2_031CE59C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032105A7 mov eax, dword ptr fs:[00000030h]6_2_032105A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032105A7 mov eax, dword ptr fs:[00000030h]6_2_032105A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032105A7 mov eax, dword ptr fs:[00000030h]6_2_032105A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C4588 mov eax, dword ptr fs:[00000030h]6_2_031C4588
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03192582 mov eax, dword ptr fs:[00000030h]6_2_03192582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03192582 mov ecx, dword ptr fs:[00000030h]6_2_03192582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B45B1 mov eax, dword ptr fs:[00000030h]6_2_031B45B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B45B1 mov eax, dword ptr fs:[00000030h]6_2_031B45B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031965D0 mov eax, dword ptr fs:[00000030h]6_2_031965D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA5D0 mov eax, dword ptr fs:[00000030h]6_2_031CA5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA5D0 mov eax, dword ptr fs:[00000030h]6_2_031CA5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE5CF mov eax, dword ptr fs:[00000030h]6_2_031CE5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE5CF mov eax, dword ptr fs:[00000030h]6_2_031CE5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CC5ED mov eax, dword ptr fs:[00000030h]6_2_031CC5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CC5ED mov eax, dword ptr fs:[00000030h]6_2_031CC5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031925E0 mov eax, dword ptr fs:[00000030h]6_2_031925E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BE5E7 mov eax, dword ptr fs:[00000030h]6_2_031BE5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03216420 mov eax, dword ptr fs:[00000030h]6_2_03216420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C8402 mov eax, dword ptr fs:[00000030h]6_2_031C8402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C8402 mov eax, dword ptr fs:[00000030h]6_2_031C8402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C8402 mov eax, dword ptr fs:[00000030h]6_2_031C8402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA430 mov eax, dword ptr fs:[00000030h]6_2_031CA430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318E420 mov eax, dword ptr fs:[00000030h]6_2_0318E420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318E420 mov eax, dword ptr fs:[00000030h]6_2_0318E420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318E420 mov eax, dword ptr fs:[00000030h]6_2_0318E420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318C427 mov eax, dword ptr fs:[00000030h]6_2_0318C427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B245A mov eax, dword ptr fs:[00000030h]6_2_031B245A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321C460 mov ecx, dword ptr fs:[00000030h]6_2_0321C460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318645D mov eax, dword ptr fs:[00000030h]6_2_0318645D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CE443 mov eax, dword ptr fs:[00000030h]6_2_031CE443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BA470 mov eax, dword ptr fs:[00000030h]6_2_031BA470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BA470 mov eax, dword ptr fs:[00000030h]6_2_031BA470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BA470 mov eax, dword ptr fs:[00000030h]6_2_031BA470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324A456 mov eax, dword ptr fs:[00000030h]6_2_0324A456
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321A4B0 mov eax, dword ptr fs:[00000030h]6_2_0321A4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C44B0 mov ecx, dword ptr fs:[00000030h]6_2_031C44B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031964AB mov eax, dword ptr fs:[00000030h]6_2_031964AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0324A49A mov eax, dword ptr fs:[00000030h]6_2_0324A49A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031904E5 mov ecx, dword ptr fs:[00000030h]6_2_031904E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03258B28 mov eax, dword ptr fs:[00000030h]6_2_03258B28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03258B28 mov eax, dword ptr fs:[00000030h]6_2_03258B28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264B00 mov eax, dword ptr fs:[00000030h]6_2_03264B00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BEB20 mov eax, dword ptr fs:[00000030h]6_2_031BEB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BEB20 mov eax, dword ptr fs:[00000030h]6_2_031BEB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320EB1D mov eax, dword ptr fs:[00000030h]6_2_0320EB1D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03188B50 mov eax, dword ptr fs:[00000030h]6_2_03188B50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03238B42 mov eax, dword ptr fs:[00000030h]6_2_03238B42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03226B40 mov eax, dword ptr fs:[00000030h]6_2_03226B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03226B40 mov eax, dword ptr fs:[00000030h]6_2_03226B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325AB40 mov eax, dword ptr fs:[00000030h]6_2_0325AB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0318CB7E mov eax, dword ptr fs:[00000030h]6_2_0318CB7E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03244B4B mov eax, dword ptr fs:[00000030h]6_2_03244B4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03244B4B mov eax, dword ptr fs:[00000030h]6_2_03244B4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03262B57 mov eax, dword ptr fs:[00000030h]6_2_03262B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03262B57 mov eax, dword ptr fs:[00000030h]6_2_03262B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03262B57 mov eax, dword ptr fs:[00000030h]6_2_03262B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03262B57 mov eax, dword ptr fs:[00000030h]6_2_03262B57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323EB50 mov eax, dword ptr fs:[00000030h]6_2_0323EB50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03244BB0 mov eax, dword ptr fs:[00000030h]6_2_03244BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03244BB0 mov eax, dword ptr fs:[00000030h]6_2_03244BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0BBE mov eax, dword ptr fs:[00000030h]6_2_031A0BBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0BBE mov eax, dword ptr fs:[00000030h]6_2_031A0BBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B0BCB mov eax, dword ptr fs:[00000030h]6_2_031B0BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B0BCB mov eax, dword ptr fs:[00000030h]6_2_031B0BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B0BCB mov eax, dword ptr fs:[00000030h]6_2_031B0BCB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321CBF0 mov eax, dword ptr fs:[00000030h]6_2_0321CBF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190BCD mov eax, dword ptr fs:[00000030h]6_2_03190BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190BCD mov eax, dword ptr fs:[00000030h]6_2_03190BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190BCD mov eax, dword ptr fs:[00000030h]6_2_03190BCD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BEBFC mov eax, dword ptr fs:[00000030h]6_2_031BEBFC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198BF0 mov eax, dword ptr fs:[00000030h]6_2_03198BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198BF0 mov eax, dword ptr fs:[00000030h]6_2_03198BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198BF0 mov eax, dword ptr fs:[00000030h]6_2_03198BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323EBD0 mov eax, dword ptr fs:[00000030h]6_2_0323EBD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CCA38 mov eax, dword ptr fs:[00000030h]6_2_031CCA38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B4A35 mov eax, dword ptr fs:[00000030h]6_2_031B4A35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B4A35 mov eax, dword ptr fs:[00000030h]6_2_031B4A35
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321CA11 mov eax, dword ptr fs:[00000030h]6_2_0321CA11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031BEA2E mov eax, dword ptr fs:[00000030h]6_2_031BEA2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CCA24 mov eax, dword ptr fs:[00000030h]6_2_031CCA24
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0A5B mov eax, dword ptr fs:[00000030h]6_2_031A0A5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A0A5B mov eax, dword ptr fs:[00000030h]6_2_031A0A5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323EA60 mov eax, dword ptr fs:[00000030h]6_2_0323EA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03196A50 mov eax, dword ptr fs:[00000030h]6_2_03196A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320CA72 mov eax, dword ptr fs:[00000030h]6_2_0320CA72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320CA72 mov eax, dword ptr fs:[00000030h]6_2_0320CA72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CCA6F mov eax, dword ptr fs:[00000030h]6_2_031CCA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CCA6F mov eax, dword ptr fs:[00000030h]6_2_031CCA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CCA6F mov eax, dword ptr fs:[00000030h]6_2_031CCA6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C8A90 mov edx, dword ptr fs:[00000030h]6_2_031C8A90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319EA80 mov eax, dword ptr fs:[00000030h]6_2_0319EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264A80 mov eax, dword ptr fs:[00000030h]6_2_03264A80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198AA0 mov eax, dword ptr fs:[00000030h]6_2_03198AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03198AA0 mov eax, dword ptr fs:[00000030h]6_2_03198AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E6AA4 mov eax, dword ptr fs:[00000030h]6_2_031E6AA4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03190AD0 mov eax, dword ptr fs:[00000030h]6_2_03190AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C4AD0 mov eax, dword ptr fs:[00000030h]6_2_031C4AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C4AD0 mov eax, dword ptr fs:[00000030h]6_2_031C4AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E6ACC mov eax, dword ptr fs:[00000030h]6_2_031E6ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E6ACC mov eax, dword ptr fs:[00000030h]6_2_031E6ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031E6ACC mov eax, dword ptr fs:[00000030h]6_2_031E6ACC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CAAEE mov eax, dword ptr fs:[00000030h]6_2_031CAAEE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CAAEE mov eax, dword ptr fs:[00000030h]6_2_031CAAEE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03188918 mov eax, dword ptr fs:[00000030h]6_2_03188918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03188918 mov eax, dword ptr fs:[00000030h]6_2_03188918
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0322892B mov eax, dword ptr fs:[00000030h]6_2_0322892B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321892A mov eax, dword ptr fs:[00000030h]6_2_0321892A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E908 mov eax, dword ptr fs:[00000030h]6_2_0320E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0320E908 mov eax, dword ptr fs:[00000030h]6_2_0320E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321C912 mov eax, dword ptr fs:[00000030h]6_2_0321C912
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03234978 mov eax, dword ptr fs:[00000030h]6_2_03234978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03234978 mov eax, dword ptr fs:[00000030h]6_2_03234978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321C97C mov eax, dword ptr fs:[00000030h]6_2_0321C97C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03264940 mov eax, dword ptr fs:[00000030h]6_2_03264940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03210946 mov eax, dword ptr fs:[00000030h]6_2_03210946
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D096E mov eax, dword ptr fs:[00000030h]6_2_031D096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D096E mov edx, dword ptr fs:[00000030h]6_2_031D096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031D096E mov eax, dword ptr fs:[00000030h]6_2_031D096E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B6962 mov eax, dword ptr fs:[00000030h]6_2_031B6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B6962 mov eax, dword ptr fs:[00000030h]6_2_031B6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B6962 mov eax, dword ptr fs:[00000030h]6_2_031B6962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032189B3 mov esi, dword ptr fs:[00000030h]6_2_032189B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032189B3 mov eax, dword ptr fs:[00000030h]6_2_032189B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032189B3 mov eax, dword ptr fs:[00000030h]6_2_032189B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031909AD mov eax, dword ptr fs:[00000030h]6_2_031909AD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031909AD mov eax, dword ptr fs:[00000030h]6_2_031909AD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031A29A0 mov eax, dword ptr fs:[00000030h]6_2_031A29A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321E9E0 mov eax, dword ptr fs:[00000030h]6_2_0321E9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A9D0 mov eax, dword ptr fs:[00000030h]6_2_0319A9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A9D0 mov eax, dword ptr fs:[00000030h]6_2_0319A9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A9D0 mov eax, dword ptr fs:[00000030h]6_2_0319A9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A9D0 mov eax, dword ptr fs:[00000030h]6_2_0319A9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A9D0 mov eax, dword ptr fs:[00000030h]6_2_0319A9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0319A9D0 mov eax, dword ptr fs:[00000030h]6_2_0319A9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C49D0 mov eax, dword ptr fs:[00000030h]6_2_031C49D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_032269C0 mov eax, dword ptr fs:[00000030h]6_2_032269C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C29F9 mov eax, dword ptr fs:[00000030h]6_2_031C29F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C29F9 mov eax, dword ptr fs:[00000030h]6_2_031C29F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0325A9D3 mov eax, dword ptr fs:[00000030h]6_2_0325A9D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323483A mov eax, dword ptr fs:[00000030h]6_2_0323483A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0323483A mov eax, dword ptr fs:[00000030h]6_2_0323483A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031CA830 mov eax, dword ptr fs:[00000030h]6_2_031CA830
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2835 mov eax, dword ptr fs:[00000030h]6_2_031B2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2835 mov eax, dword ptr fs:[00000030h]6_2_031B2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2835 mov eax, dword ptr fs:[00000030h]6_2_031B2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2835 mov ecx, dword ptr fs:[00000030h]6_2_031B2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2835 mov eax, dword ptr fs:[00000030h]6_2_031B2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031B2835 mov eax, dword ptr fs:[00000030h]6_2_031B2835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0321C810 mov eax, dword ptr fs:[00000030h]6_2_0321C810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194859 mov eax, dword ptr fs:[00000030h]6_2_03194859
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03194859 mov eax, dword ptr fs:[00000030h]6_2_03194859
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_031C0854 mov eax, dword ptr fs:[00000030h]6_2_031C0854
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_03226870 mov eax, dword ptr fs:[00000030h]6_2_03226870
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_013457AD Wow64SetThreadContext,VirtualAllocEx,WriteProcessMemory,ResumeThread,4_2_013457AD
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtWriteVirtualMemory: Direct from: 0x77762E3CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtMapViewOfSection: Direct from: 0x77762D1CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtNotifyChangeKey: Direct from: 0x77763C2CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtCreateMutant: Direct from: 0x777635CCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtResumeThread: Direct from: 0x777636ACJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtProtectVirtualMemory: Direct from: 0x77757B2EJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtQuerySystemInformation: Direct from: 0x77762DFCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtAllocateVirtualMemory: Direct from: 0x77762BFCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtReadFile: Direct from: 0x77762ADCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtDelayExecution: Direct from: 0x77762DDCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtWriteVirtualMemory: Direct from: 0x7776490CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtQueryInformationProcess: Direct from: 0x77762C26Jump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtResumeThread: Direct from: 0x77762FBCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtCreateUserProcess: Direct from: 0x7776371CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtSetInformationThread: Direct from: 0x777563F9Jump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtAllocateVirtualMemory: Direct from: 0x77763C9CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtSetInformationThread: Direct from: 0x77762B4CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtQueryAttributesFile: Direct from: 0x77762E6CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtClose: Direct from: 0x77762B6C
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtReadVirtualMemory: Direct from: 0x77762E8CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtCreateKey: Direct from: 0x77762C6CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtQuerySystemInformation: Direct from: 0x777648CCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtAllocateVirtualMemory: Direct from: 0x777648ECJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtQueryVolumeInformationFile: Direct from: 0x77762F2CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtOpenSection: Direct from: 0x77762E0CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtDeviceIoControlFile: Direct from: 0x77762AECJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtAllocateVirtualMemory: Direct from: 0x77762BECJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtQueryInformationToken: Direct from: 0x77762CACJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtTerminateThread: Direct from: 0x77762FCCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtCreateFile: Direct from: 0x77762FECJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtOpenFile: Direct from: 0x77762DCCJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtOpenKeyEx: Direct from: 0x77762B9CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtSetInformationProcess: Direct from: 0x77762C5CJump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeNtProtectVirtualMemory: Direct from: 0x77762F9CJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\SysWOW64\runonce.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeThread register set: target process: 3808Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeThread APC queued: target process: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1173008Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user~1\AppData\Local\Temp\x.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files (x86)\rsHocUcVlFhHrLxlWJwNhNsDAIOzcaLDYsIBUOaXAKPWHe\pWjI78htpJ4.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: pWjI78htpJ4.exe, 0000000E.00000002.3730361508.00000000015E0000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 0000000E.00000000.1659343101.00000000015E1000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000000.1801090549.0000000001931000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: pWjI78htpJ4.exe, 0000000E.00000002.3730361508.00000000015E0000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 0000000E.00000000.1659343101.00000000015E1000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000000.1801090549.0000000001931000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: pWjI78htpJ4.exe, 0000000E.00000002.3730361508.00000000015E0000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 0000000E.00000000.1659343101.00000000015E1000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000000.1801090549.0000000001931000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                Source: pWjI78htpJ4.exe, 0000000E.00000002.3730361508.00000000015E0000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 0000000E.00000000.1659343101.00000000015E1000.00000002.00000001.00040000.00000000.sdmp, pWjI78htpJ4.exe, 00000010.00000000.1801090549.0000000001931000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\laser (2).ps1 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1733946439.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.3731547549.0000000002D40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3731493934.0000000004ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3727855592.00000000035E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3719515035.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1733243869.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3731500134.0000000002CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1735711958.00000000034B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1733946439.0000000003040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.3731547549.0000000002D40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3731493934.0000000004ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3727855592.00000000035E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3719515035.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1733243869.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3731500134.0000000002CB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1735711958.00000000034B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory113
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)712
                Process Injection
                1
                Abuse Elevation Control Mechanism
                Security Account Manager221
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
                Obfuscated Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput Capture4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                Software Packing
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Masquerading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt41
                Virtualization/Sandbox Evasion
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron712
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1618208 Sample: laser (2).ps1 Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 47 www.nmw365.xyz 2->47 49 www.seasay.xyz 2->49 51 16 other IPs or domains 2->51 63 Suricata IDS alerts for network traffic 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Antivirus detection for URL or domain 2->67 71 5 other signatures 2->71 11 powershell.exe 16 2->11         started        15 notepad.exe 5 2->15         started        signatures3 69 Performs DNS queries to domains with low reputation 49->69 process4 file5 39 C:\Users\user\AppData\Local\Temp\x.exe, PE32 11->39 dropped 77 Suspicious execution chain found 11->77 79 Found suspicious powershell code related to unpacking or dynamic code loading 11->79 81 Powershell drops PE file 11->81 17 x.exe 3 11->17         started        20 conhost.exe 11->20         started        signatures6 process7 signatures8 53 Antivirus detection for dropped file 17->53 55 Multi AV Scanner detection for dropped file 17->55 57 Contains functionality to inject code into remote processes 17->57 59 3 other signatures 17->59 22 RegAsm.exe 17->22         started        25 RegAsm.exe 17->25         started        process9 signatures10 73 Maps a DLL or memory area into another process 22->73 27 pWjI78htpJ4.exe 22->27 injected process11 signatures12 75 Found direct / indirect Syscall (likely to bypass EDR) 27->75 30 runonce.exe 13 27->30         started        process13 signatures14 83 Tries to steal Mail credentials (via file / registry access) 30->83 85 Tries to harvest and steal browser information (history, passwords, etc) 30->85 87 Modifies the context of a thread in another process (thread injection) 30->87 89 3 other signatures 30->89 33 pWjI78htpJ4.exe 30->33 injected 37 firefox.exe 30->37         started        process15 dnsIp16 41 www.jyc11.top 160.238.85.158, 49998, 49999, 50000 POWERLINE-AS-APPOWERLINEDATACENTERHK Hong Kong 33->41 43 www.solucionesclinicas.net 217.160.0.240, 50002, 50003, 50004 ONEANDONE-ASBrauerstrasse48DE Germany 33->43 45 10 other IPs or domains 33->45 61 Found direct / indirect Syscall (likely to bypass EDR) 33->61 signatures17

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.