Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
begin.exe

Overview

General Information

Sample name:begin.exe
Analysis ID:1632014
MD5:cf3268c419da49574f98a9a36d263165
SHA1:d0f43a0a26dbe8900a7ff684870e8c1ef424286d
SHA256:0fda5f40e7752da1cdd8b8ae961258251b78f421dd2a089a7184aa33b83db06c
Tags:exeuser-aachum
Infos:

Detection

DarkTortilla, FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
Yara detected FormBook
AI detected suspicious PE digital signature
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found direct / indirect Syscall (likely to bypass EDR)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to launch a process as a different user
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • begin.exe (PID: 7756 cmdline: "C:\Users\user\Desktop\begin.exe" MD5: CF3268C419DA49574F98A9A36D263165)
    • AddInProcess32.exe (PID: 8172 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 8180 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 6692 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 7212 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 7228 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 7504 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
      • fMCYiMEFQZmFBs7vgZ5.exe (PID: 4396 cmdline: "C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\miEyYqXzMPxCr.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • comp.exe (PID: 1752 cmdline: "C:\Windows\SysWOW64\comp.exe" MD5: 712EF348F7032AA1C80D24600BA5452D)
          • fMCYiMEFQZmFBs7vgZ5.exe (PID: 3040 cmdline: "C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\6m79W5kBr.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 2888 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
NameDescriptionAttributionBlogpost URLsLink
Formbook, FormboFormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware.
  • SWEED
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000E.00000002.2477632033.00000000034C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000B.00000002.1979345858.0000000001040000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000000.00000002.1898946786.0000000005950000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
        0000000B.00000002.1978397440.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000000.00000002.1891732318.0000000003DB9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.begin.exe.5950000.6.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
              0.2.begin.exe.5950000.6.raw.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                0.2.begin.exe.3db9550.5.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                  0.2.begin.exe.3db9550.5.raw.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                    11.2.AddInProcess32.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T18:33:24.913134+010020507451Malware Command and Control Activity Detected192.168.2.44972413.248.169.4880TCP
                      2025-03-07T18:33:44.014863+010020507451Malware Command and Control Activity Detected192.168.2.449728104.21.64.180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T18:33:24.913134+010028554651A Network Trojan was detected192.168.2.44972413.248.169.4880TCP
                      2025-03-07T18:33:44.014863+010028554651A Network Trojan was detected192.168.2.449728104.21.64.180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T18:31:43.935150+010028554641A Network Trojan was detected192.168.2.44973113.248.169.4880TCP
                      2025-03-07T18:33:36.475419+010028554641A Network Trojan was detected192.168.2.449725104.21.64.180TCP
                      2025-03-07T18:33:39.448710+010028554641A Network Trojan was detected192.168.2.449726104.21.64.180TCP
                      2025-03-07T18:33:41.164656+010028554641A Network Trojan was detected192.168.2.449727104.21.64.180TCP
                      2025-03-07T18:33:49.906745+010028554641A Network Trojan was detected192.168.2.44972913.248.169.4880TCP
                      2025-03-07T18:33:52.262276+010028554641A Network Trojan was detected192.168.2.44973013.248.169.4880TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: begin.exeAvira: detected
                      Source: http://www.kdrqcyusevx.info/z84n/Avira URL Cloud: Label: malware
                      Source: http://www.kdrqcyusevx.info/z84n/?68ZDJP=o7gPcljrbuMGgdsd1LsQM10lReUDL49ypO1I11GlE9lyPwKxV3D/8LWT1eQFq4eHx6tatYqwXiNpfkH1tWmFEu8+AQQ9oryPELiqSvHC/WMcIDoq6daKMeU=&G4JD=1Deh6h3HAvira URL Cloud: Label: malware
                      Source: begin.exeVirustotal: Detection: 69%Perma Link
                      Source: begin.exeReversingLabs: Detection: 52%
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2477632033.00000000034C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1979345858.0000000001040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1978397440.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2477550350.0000000003470000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2474981906.00000000030A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2479750364.0000000004E20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1981382143.0000000002050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2477132042.00000000037A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: begin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: begin.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: AddInProcess32.pdb source: comp.exe, 0000000E.00000002.2478515912.0000000003EDC000.00000004.10000000.00040000.00000000.sdmp, comp.exe, 0000000E.00000002.2475910554.00000000032B0000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2478159799.00000000029EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.2295964160.00000000383CC000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: comp.pdb source: AddInProcess32.exe, 0000000B.00000002.1978909211.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000003.1920210364.0000000001114000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: comp.pdbGCTL source: AddInProcess32.exe, 0000000B.00000002.1978909211.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000003.1920210364.0000000001114000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: AddInProcess32.exe, 0000000B.00000002.1979815612.0000000001100000.00000040.00001000.00020000.00000000.sdmp, comp.exe, 0000000E.00000003.1978689528.0000000003542000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.0000000003A4E000.00000040.00001000.00020000.00000000.sdmp, comp.exe, 0000000E.00000003.1980925950.00000000036FC000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.00000000038B0000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: AddInProcess32.exe, AddInProcess32.exe, 0000000B.00000002.1979815612.0000000001100000.00000040.00001000.00020000.00000000.sdmp, comp.exe, comp.exe, 0000000E.00000003.1978689528.0000000003542000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.0000000003A4E000.00000040.00001000.00020000.00000000.sdmp, comp.exe, 0000000E.00000003.1980925950.00000000036FC000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.00000000038B0000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: AddInProcess32.pdbpw source: comp.exe, 0000000E.00000002.2478515912.0000000003EDC000.00000004.10000000.00040000.00000000.sdmp, comp.exe, 0000000E.00000002.2475910554.00000000032B0000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2478159799.00000000029EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.2295964160.00000000383CC000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000000.1900733856.000000000073F000.00000002.00000001.01000000.00000009.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2476197228.000000000073F000.00000002.00000001.01000000.00000009.sdmp
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030BC650 FindFirstFileW,FindNextFileW,FindClose,14_2_030BC650
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_061A2340
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_061A2338
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_06430F40
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_06430F78
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_06725438
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_06728098
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_06728098
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_06727998
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then xor edx, edx0_2_06727FD0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then xor edx, edx0_2_06727FC5
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_06727D78
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_06727D78
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_06727D6C
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_06727D6C
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_06727A34
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_06727A28
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_06727A1C
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_06727BFD
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_0672808C
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_0672808C
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_067279BD
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_082A1AA0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_082A19EF
                      Source: C:\Users\user\Desktop\begin.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_082A1A50
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 4x nop then xor eax, eax14_2_030A9F70
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 4x nop then pop edi14_2_030AE306
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 4x nop then mov ebx, 00000004h14_2_036F04DE

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49724 -> 13.248.169.48:80
                      Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49724 -> 13.248.169.48:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49726 -> 104.21.64.1:80
                      Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49728 -> 104.21.64.1:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49727 -> 104.21.64.1:80
                      Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49728 -> 104.21.64.1:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49729 -> 13.248.169.48:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49730 -> 13.248.169.48:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49725 -> 104.21.64.1:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49731 -> 13.248.169.48:80
                      Source: DNS query: www.micusa.xyz
                      Source: DNS query: www.layunin.xyz
                      Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                      Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                      Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /ahh1/?68ZDJP=KgTfi8spYvzwzQCi0nAt05PRXpsO+aMWdjR26M6JFm/rOdHTxS9xt0VUcOp0bQ6oIdUEaOE2WIe6UlLp36wVzBq7xf/BNe8xVQN6dj7ilBHEaGiO0pOHz4A=&G4JD=1Deh6h3H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USHost: www.micusa.xyzConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG GT-I9301I Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                      Source: global trafficHTTP traffic detected: GET /z84n/?68ZDJP=o7gPcljrbuMGgdsd1LsQM10lReUDL49ypO1I11GlE9lyPwKxV3D/8LWT1eQFq4eHx6tatYqwXiNpfkH1tWmFEu8+AQQ9oryPELiqSvHC/WMcIDoq6daKMeU=&G4JD=1Deh6h3H HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USHost: www.kdrqcyusevx.infoConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG GT-I9301I Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                      Source: global trafficDNS traffic detected: DNS query: www.micusa.xyz
                      Source: global trafficDNS traffic detected: DNS query: www.kdrqcyusevx.info
                      Source: global trafficDNS traffic detected: DNS query: www.layunin.xyz
                      Source: unknownHTTP traffic detected: POST /z84n/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USAccept-Encoding: gzip, deflateHost: www.kdrqcyusevx.infoOrigin: http://www.kdrqcyusevx.infoReferer: http://www.kdrqcyusevx.info/z84n/Content-Length: 203Cache-Control: no-cacheContent-Type: application/x-www-form-urlencodedConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG GT-I9301I Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36Data Raw: 36 38 5a 44 4a 50 3d 6c 35 49 76 66 54 33 6f 55 34 55 7a 6b 39 59 55 38 65 6b 38 56 6c 67 68 49 50 35 73 58 6f 6b 4f 71 66 77 52 6d 51 65 4e 45 50 42 36 4a 41 65 35 66 69 65 64 37 64 76 78 74 2f 51 30 31 49 50 76 79 4c 4e 71 73 4d 65 42 57 51 68 2b 53 7a 6d 72 76 6c 4b 46 56 4b 6f 4b 50 46 73 34 78 5a 6a 76 51 5a 69 65 52 38 7a 6e 70 6a 73 61 48 67 4d 56 2b 73 69 2b 61 75 4c 6c 33 7a 6c 4d 45 41 36 34 49 5a 6f 4e 45 43 51 71 2f 35 7a 39 4f 66 63 36 2b 53 52 6c 39 59 42 32 72 66 34 7a 43 39 61 57 67 52 64 75 76 31 51 4a 41 59 64 6f 6d 54 35 75 51 62 79 6e 37 69 78 69 4c 63 2b 49 49 74 36 79 79 67 3d 3d Data Ascii: 68ZDJP=l5IvfT3oU4Uzk9YU8ek8VlghIP5sXokOqfwRmQeNEPB6JAe5fied7dvxt/Q01IPvyLNqsMeBWQh+SzmrvlKFVKoKPFs4xZjvQZieR8znpjsaHgMV+si+auLl3zlMEA64IZoNECQq/5z9Ofc6+SRl9YB2rf4zC9aWgRduv1QJAYdomT5uQbyn7ixiLc+IIt6yyg==
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 17:33:36 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MMNIrUda6HWR5Kyb76YKJzMaEbDtsyFLGOgECWHTJKvLhdjhM%2FeuObKqs4mRCVJIIiQ5k3o0LdZDWnWbO5APIdoCj09EnDxDcgzI33X2G8un1hLueRprqc0qzvHj0sTpkmZSCXQRXA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cbd6bc89274414-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=70349&min_rtt=70349&rtt_var=35174&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=780&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 17:33:41 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xTwDbc1vV7VqEBkl9Y03bRe1N0Vjbdy%2BgrjqBX2Ajl1%2FrwdUlWfXVcgLNtAWn9vMEUi9vuf1nUWhXwpikRJyu50gokEIABhTK32wdU%2FFtvxVuUEwSfa%2Fn%2FwKvu0kTqru8tCx88jx9w%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cbd6daead04e4d-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2140&min_rtt=2140&rtt_var=1070&sent=5&recv=8&lost=0&retrans=0&sent_bytes=0&recv_bytes=7057&delivery_rate=0&cwnd=67&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 17:33:43 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XNwU1eQbFVlaOxl44Nd3yfNbxzzOvM1f%2FuUVWLhAisrPzrBIZkaGxxBaYXhyLgAjPJqGW5mBBTjWdxx8mBJifw41jyoVx1m6INigw%2Fq9Zi6ruO34HFtm7n3aOiSmb9zCSiShkN0mUw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cbd6ec4deec358-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=31201&min_rtt=31201&rtt_var=15600&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=510&delivery_rate=0&cwnd=150&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 63 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: c4<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>0
                      Source: begin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: begin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: begin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: begin.exeString found in binary or memory: http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
                      Source: begin.exeString found in binary or memory: http://cevcsca2021.ocsp-certum.com07
                      Source: begin.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
                      Source: begin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: begin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: begin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: begin.exeString found in binary or memory: http://ocsp.digicert.com0A
                      Source: begin.exeString found in binary or memory: http://ocsp.digicert.com0C
                      Source: begin.exeString found in binary or memory: http://ocsp.digicert.com0X
                      Source: begin.exeString found in binary or memory: http://repository.certum.pl/cevcsca2021.cer0
                      Source: begin.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
                      Source: begin.exeString found in binary or memory: http://subca.ocsp-certum.com02
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: begin.exe, 00000000.00000002.1901822268.0000000006760000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.htmlmm
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: begin.exeString found in binary or memory: http://www.certum.pl/CPS0
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2479750364.0000000004EE1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.layunin.xyz
                      Source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2479750364.0000000004EE1000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.layunin.xyz/s9ur/
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                      Source: begin.exeString found in binary or memory: https://api.socialmediaplatform.com/postSSocial
                      Source: begin.exeString found in binary or memory: https://api.yourcloudservice.com/syncUData
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                      Source: comp.exe, 0000000E.00000002.2475910554.00000000032F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                      Source: comp.exe, 0000000E.00000002.2475910554.00000000032F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                      Source: comp.exe, 0000000E.00000002.2475910554.00000000032CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                      Source: comp.exe, 0000000E.00000002.2475910554.00000000032F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                      Source: comp.exe, 0000000E.00000002.2475910554.00000000032CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                      Source: comp.exe, 0000000E.00000003.2174620060.0000000008203000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                      Source: begin.exeString found in binary or memory: https://www.certum.pl/CPS0
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                      Source: comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2477632033.00000000034C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1979345858.0000000001040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1978397440.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2477550350.0000000003470000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2474981906.00000000030A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2479750364.0000000004E20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1981382143.0000000002050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2477132042.00000000037A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD77308 NtUnmapViewOfSection,0_2_0DD77308
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0042C763 NtClose,11_2_0042C763
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172B60 NtClose,LdrInitializeThunk,11_2_01172B60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172DF0 NtQuerySystemInformation,LdrInitializeThunk,11_2_01172DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172C70 NtFreeVirtualMemory,LdrInitializeThunk,11_2_01172C70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011735C0 NtCreateMutant,LdrInitializeThunk,11_2_011735C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01174340 NtSetContextThread,11_2_01174340
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01174650 NtSuspendThread,11_2_01174650
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172B80 NtQueryInformationFile,11_2_01172B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172BA0 NtEnumerateValueKey,11_2_01172BA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172BF0 NtAllocateVirtualMemory,11_2_01172BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172BE0 NtQueryValueKey,11_2_01172BE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172AB0 NtWaitForSingleObject,11_2_01172AB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172AD0 NtReadFile,11_2_01172AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172AF0 NtWriteFile,11_2_01172AF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172D10 NtMapViewOfSection,11_2_01172D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172D00 NtSetInformationFile,11_2_01172D00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172D30 NtUnmapViewOfSection,11_2_01172D30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172DB0 NtEnumerateKey,11_2_01172DB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172DD0 NtDelayExecution,11_2_01172DD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172C00 NtQueryInformationProcess,11_2_01172C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172C60 NtCreateKey,11_2_01172C60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172CA0 NtQueryInformationToken,11_2_01172CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172CC0 NtQueryVirtualMemory,11_2_01172CC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172CF0 NtOpenProcess,11_2_01172CF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172F30 NtCreateSection,11_2_01172F30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172F60 NtCreateProcessEx,11_2_01172F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172F90 NtProtectVirtualMemory,11_2_01172F90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172FB0 NtResumeThread,11_2_01172FB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172FA0 NtQuerySection,11_2_01172FA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172FE0 NtCreateFile,11_2_01172FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172E30 NtWriteVirtualMemory,11_2_01172E30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172E80 NtReadVirtualMemory,11_2_01172E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172EA0 NtAdjustPrivilegesToken,11_2_01172EA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172EE0 NtQueueApcThread,11_2_01172EE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01173010 NtOpenDirectoryObject,11_2_01173010
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01173090 NtSetValueKey,11_2_01173090
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011739B0 NtGetContextThread,11_2_011739B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01173D10 NtOpenProcessToken,11_2_01173D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01173D70 NtOpenThread,11_2_01173D70
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03924340 NtSetContextThread,LdrInitializeThunk,14_2_03924340
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03924650 NtSuspendThread,LdrInitializeThunk,14_2_03924650
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922BA0 NtEnumerateValueKey,LdrInitializeThunk,14_2_03922BA0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922BF0 NtAllocateVirtualMemory,LdrInitializeThunk,14_2_03922BF0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922BE0 NtQueryValueKey,LdrInitializeThunk,14_2_03922BE0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922B60 NtClose,LdrInitializeThunk,14_2_03922B60
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922AD0 NtReadFile,LdrInitializeThunk,14_2_03922AD0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922AF0 NtWriteFile,LdrInitializeThunk,14_2_03922AF0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922FB0 NtResumeThread,LdrInitializeThunk,14_2_03922FB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922FE0 NtCreateFile,LdrInitializeThunk,14_2_03922FE0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922F30 NtCreateSection,LdrInitializeThunk,14_2_03922F30
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922E80 NtReadVirtualMemory,LdrInitializeThunk,14_2_03922E80
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922EE0 NtQueueApcThread,LdrInitializeThunk,14_2_03922EE0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922DD0 NtDelayExecution,LdrInitializeThunk,14_2_03922DD0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922DF0 NtQuerySystemInformation,LdrInitializeThunk,14_2_03922DF0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922D10 NtMapViewOfSection,LdrInitializeThunk,14_2_03922D10
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922D30 NtUnmapViewOfSection,LdrInitializeThunk,14_2_03922D30
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922CA0 NtQueryInformationToken,LdrInitializeThunk,14_2_03922CA0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922C70 NtFreeVirtualMemory,LdrInitializeThunk,14_2_03922C70
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922C60 NtCreateKey,LdrInitializeThunk,14_2_03922C60
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039235C0 NtCreateMutant,LdrInitializeThunk,14_2_039235C0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039239B0 NtGetContextThread,LdrInitializeThunk,14_2_039239B0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922B80 NtQueryInformationFile,14_2_03922B80
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922AB0 NtWaitForSingleObject,14_2_03922AB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922F90 NtProtectVirtualMemory,14_2_03922F90
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922FA0 NtQuerySection,14_2_03922FA0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922F60 NtCreateProcessEx,14_2_03922F60
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922EA0 NtAdjustPrivilegesToken,14_2_03922EA0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922E30 NtWriteVirtualMemory,14_2_03922E30
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922DB0 NtEnumerateKey,14_2_03922DB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922D00 NtSetInformationFile,14_2_03922D00
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922CC0 NtQueryVirtualMemory,14_2_03922CC0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922CF0 NtOpenProcess,14_2_03922CF0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03922C00 NtQueryInformationProcess,14_2_03922C00
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03923090 NtSetValueKey,14_2_03923090
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03923010 NtOpenDirectoryObject,14_2_03923010
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03923D10 NtOpenProcessToken,14_2_03923D10
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03923D70 NtOpenThread,14_2_03923D70
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030C9300 NtReadFile,14_2_030C9300
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030C93F0 NtDeleteFile,14_2_030C93F0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030C9190 NtCreateFile,14_2_030C9190
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030C9600 NtAllocateVirtualMemory,14_2_030C9600
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030C9490 NtClose,14_2_030C9490
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD74F18 CreateProcessAsUserW,0_2_0DD74F18
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C82AFF0_2_02C82AFF
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C8E9300_2_02C8E930
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C890080_2_02C89008
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C831B00_2_02C831B0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C8E9200_2_02C8E920
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C88FF90_2_02C88FF9
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_02C8DDA80_2_02C8DDA8
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061A2D780_2_061A2D78
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061AE6100_2_061AE610
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061AE6200_2_061AE620
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061A2D6A0_2_061A2D6A
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061ABC640_2_061ABC64
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_066FF6880_2_066FF688
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_066F3DF80_2_066F3DF8
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_066FDE500_2_066FDE50
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_066F3DEA0_2_066F3DEA
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06725FC00_2_06725FC0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06723C180_2_06723C18
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06728D280_2_06728D28
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06725A600_2_06725A60
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_067287770_2_06728777
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_067287780_2_06728778
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0672874B0_2_0672874B
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06725FB10_2_06725FB1
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06723C080_2_06723C08
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06728D190_2_06728D19
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0672F0180_2_0672F018
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0672F0080_2_0672F008
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A40200_2_082A4020
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AA4D10_2_082AA4D1
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A5D280_2_082A5D28
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A51080_2_082A5108
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A65A10_2_082A65A1
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A7E180_2_082A7E18
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A1AA00_2_082A1AA0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A0A880_2_082A0A88
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AF7380_2_082AF738
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A6F690_2_082A6F69
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A5C700_2_082A5C70
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AA0B10_2_082AA0B1
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AB08F0_2_082AB08F
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AEC800_2_082AEC80
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A8CF00_2_082A8CF0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AA0C00_2_082AA0C0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A5CDD0_2_082A5CDD
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A7D3A0_2_082A7D3A
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A8D000_2_082A8D00
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A19EF0_2_082A19EF
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A0A780_2_082A0A78
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A9E780_2_082A9E78
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A1A500_2_082A1A50
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A9E880_2_082A9E88
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A9AD00_2_082A9AD0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AA3280_2_082AA328
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082AA3380_2_082AA338
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A97E00_2_082A97E0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_082A97D00_2_082A97D0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD73DD80_2_0DD73DD8
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD755800_2_0DD75580
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD758870_2_0DD75887
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD700400_2_0DD70040
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD793F00_2_0DD793F0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD7ADA00_2_0DD7ADA0
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD755700_2_0DD75570
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD71D300_2_0DD71D30
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD737D80_2_0DD737D8
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD737C90_2_0DD737C9
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD75F120_2_0DD75F12
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD730700_2_0DD73070
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD730600_2_0DD73060
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD7003F0_2_0DD7003F
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_0DD7324F0_2_0DD7324F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041877311_2_00418773
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040306011_2_00403060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041697311_2_00416973
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041692C11_2_0041692C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040E18011_2_0040E180
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041018311_2_00410183
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040E18311_2_0040E183
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040E2C811_2_0040E2C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040E2D311_2_0040E2D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004022F211_2_004022F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040230011_2_00402300
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00402BB011_2_00402BB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004024B011_2_004024B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0042ED8311_2_0042ED83
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040FF5A11_2_0040FF5A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040FF6311_2_0040FF63
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040278011_2_00402780
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DA11811_2_011DA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113010011_2_01130100
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C815811_2_011C8158
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_012001AA11_2_012001AA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F41A211_2_011F41A2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F81CC11_2_011F81CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D200011_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FA35211_2_011FA352
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_012003E611_2_012003E6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E3F011_2_0114E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E027411_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C02C011_2_011C02C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114053511_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0120059111_2_01200591
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E442011_2_011E4420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F244611_2_011F2446
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EE4F611_2_011EE4F6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116475011_2_01164750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114077011_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113C7C011_2_0113C7C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115C6E011_2_0115C6E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115696211_2_01156962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0120A9A611_2_0120A9A6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A011_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114A84011_2_0114A840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114284011_2_01142840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011268B811_2_011268B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E8F011_2_0116E8F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FAB4011_2_011FAB40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F6BD711_2_011F6BD7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA8011_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DCD1F11_2_011DCD1F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114AD0011_2_0114AD00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01158DBF11_2_01158DBF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113ADE011_2_0113ADE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140C0011_2_01140C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0CB511_2_011E0CB5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130CF211_2_01130CF2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01160F3011_2_01160F30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E2F3011_2_011E2F30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01182F2811_2_01182F28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B4F4011_2_011B4F40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BEFA011_2_011BEFA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01132FC811_2_01132FC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114CFE011_2_0114CFE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FEE2611_2_011FEE26
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140E5911_2_01140E59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152E9011_2_01152E90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FCE9311_2_011FCE93
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FEEDB11_2_011FEEDB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0120B16B11_2_0120B16B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112F17211_2_0112F172
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117516C11_2_0117516C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114B1B011_2_0114B1B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EF0CC11_2_011EF0CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011470C011_2_011470C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F70E911_2_011F70E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FF0E011_2_011FF0E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F132D11_2_011F132D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112D34C11_2_0112D34C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0118739A11_2_0118739A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011452A011_2_011452A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115B2C011_2_0115B2C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E12ED11_2_011E12ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F757111_2_011F7571
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DD5B011_2_011DD5B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_012095C311_2_012095C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FF43F11_2_011FF43F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113146011_2_01131460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FF7B011_2_011FF7B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0118563011_2_01185630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F16CC11_2_011F16CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D591011_2_011D5910
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114995011_2_01149950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115B95011_2_0115B950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AD80011_2_011AD800
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011438E011_2_011438E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FFB7611_2_011FFB76
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115FB8011_2_0115FB80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B5BF011_2_011B5BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117DBF911_2_0117DBF9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FFA4911_2_011FFA49
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F7A4611_2_011F7A46
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B3A6C11_2_011B3A6C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DDAAC11_2_011DDAAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01185AA011_2_01185AA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E1AA311_2_011E1AA3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EDAC611_2_011EDAC6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F1D5A11_2_011F1D5A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01143D4011_2_01143D40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F7D7311_2_011F7D73
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115FDC011_2_0115FDC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B9C3211_2_011B9C32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FFCF211_2_011FFCF2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FFF0911_2_011FFF09
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01141F9211_2_01141F92
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FFFB111_2_011FFFB1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01103FD211_2_01103FD2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01103FD511_2_01103FD5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01149EB011_2_01149EB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039B03E614_2_039B03E6
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038FE3F014_2_038FE3F0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AA35214_2_039AA352
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039702C014_2_039702C0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0399027414_2_03990274
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039B01AA14_2_039B01AA
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A41A214_2_039A41A2
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A81CC14_2_039A81CC
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0398A11814_2_0398A118
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038E010014_2_038E0100
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0397815814_2_03978158
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0398200014_2_03982000
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0391475014_2_03914750
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F077014_2_038F0770
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0390C6E014_2_0390C6E0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039B059114_2_039B0591
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F053514_2_038F0535
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0399E4F614_2_0399E4F6
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0399442014_2_03994420
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A244614_2_039A2446
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A6BD714_2_039A6BD7
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AAB4014_2_039AAB40
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038EEA8014_2_038EEA80
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F29A014_2_038F29A0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039BA9A614_2_039BA9A6
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0390696214_2_03906962
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038D68B814_2_038D68B8
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0391E8F014_2_0391E8F0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F284014_2_038F2840
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038FA84014_2_038FA840
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0396EFA014_2_0396EFA0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038E2FC814_2_038E2FC8
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038FCFE014_2_038FCFE0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03910F3014_2_03910F30
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03992F3014_2_03992F30
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03932F2814_2_03932F28
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03964F4014_2_03964F40
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03902E9014_2_03902E90
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039ACE9314_2_039ACE93
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AEEDB14_2_039AEEDB
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AEE2614_2_039AEE26
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F0E5914_2_038F0E59
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03908DBF14_2_03908DBF
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038EADE014_2_038EADE0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0398CD1F14_2_0398CD1F
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038FAD0014_2_038FAD00
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03990CB514_2_03990CB5
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038E0CF214_2_038E0CF2
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F0C0014_2_038F0C00
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0393739A14_2_0393739A
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A132D14_2_039A132D
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038DD34C14_2_038DD34C
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F52A014_2_038F52A0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0390B2C014_2_0390B2C0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039912ED14_2_039912ED
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038FB1B014_2_038FB1B0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039BB16B14_2_039BB16B
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0392516C14_2_0392516C
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038DF17214_2_038DF172
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F70C014_2_038F70C0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0399F0CC14_2_0399F0CC
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A70E914_2_039A70E9
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AF0E014_2_039AF0E0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AF7B014_2_039AF7B0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A16CC14_2_039A16CC
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0393563014_2_03935630
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0398D5B014_2_0398D5B0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039B95C314_2_039B95C3
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A757114_2_039A7571
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AF43F14_2_039AF43F
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038E146014_2_038E1460
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0390FB8014_2_0390FB80
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03965BF014_2_03965BF0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0392DBF914_2_0392DBF9
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AFB7614_2_039AFB76
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03935AA014_2_03935AA0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0398DAAC14_2_0398DAAC
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03991AA314_2_03991AA3
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0399DAC614_2_0399DAC6
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AFA4914_2_039AFA49
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A7A4614_2_039A7A46
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03963A6C14_2_03963A6C
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0398591014_2_03985910
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0390B95014_2_0390B950
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F995014_2_038F9950
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F38E014_2_038F38E0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0395D80014_2_0395D800
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F1F9214_2_038F1F92
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AFFB114_2_039AFFB1
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038B3FD214_2_038B3FD2
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038B3FD514_2_038B3FD5
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AFF0914_2_039AFF09
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F9EB014_2_038F9EB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_0390FDC014_2_0390FDC0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A1D5A14_2_039A1D5A
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038F3D4014_2_038F3D40
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039A7D7314_2_039A7D73
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_039AFCF214_2_039AFCF2
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_03969C3214_2_03969C32
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030B1DF014_2_030B1DF0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030AAFF514_2_030AAFF5
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030AAEAD14_2_030AAEAD
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030AAEB014_2_030AAEB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030ACEB014_2_030ACEB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030ACC8714_2_030ACC87
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030ACC9014_2_030ACC90
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030AB00014_2_030AB000
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030B365914_2_030B3659
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030B36A014_2_030B36A0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030B54A014_2_030B54A0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030CBAB014_2_030CBAB0
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_036FE3D514_2_036FE3D5
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_036FE4F414_2_036FE4F4
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_036FCB7114_2_036FCB71
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_036FCBE814_2_036FCBE8
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_036FD95814_2_036FD958
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_036FE88C14_2_036FE88C
                      Source: C:\Windows\SysWOW64\comp.exeCode function: String function: 0396F290 appears 105 times
                      Source: C:\Windows\SysWOW64\comp.exeCode function: String function: 03925130 appears 58 times
                      Source: C:\Windows\SysWOW64\comp.exeCode function: String function: 038DB970 appears 280 times
                      Source: C:\Windows\SysWOW64\comp.exeCode function: String function: 03937E54 appears 111 times
                      Source: C:\Windows\SysWOW64\comp.exeCode function: String function: 0395EA12 appears 86 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 011BF290 appears 105 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 011AEA12 appears 86 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 01187E54 appears 111 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 01175130 appears 58 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 0112B970 appears 280 times
                      Source: begin.exeStatic PE information: invalid certificate
                      Source: begin.exe, 00000000.00000000.1229546152.0000000000A3E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNamexrecovery_installer.exe4 vs begin.exe
                      Source: begin.exe, 00000000.00000002.1883190709.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs begin.exe
                      Source: begin.exe, 00000000.00000002.1898946786.0000000005950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFalimotin.dll4 vs begin.exe
                      Source: begin.exe, 00000000.00000002.1891732318.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileNamexrecovery_installer.exe4 vs begin.exe
                      Source: begin.exe, 00000000.00000002.1906448272.00000000082B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRP8SH.dll6 vs begin.exe
                      Source: begin.exe, 00000000.00000002.1891732318.0000000004256000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileNamexrecovery_installer.exe4 vs begin.exe
                      Source: begin.exeBinary or memory string: OriginalFileNamexrecovery_installer.exe4 vs begin.exe
                      Source: begin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: begin.exe, j9MAp5g4.csCryptographic APIs: 'CreateDecryptor'
                      Source: begin.exe, i4BWg9r1.csCryptographic APIs: 'CreateDecryptor'
                      Source: begin.exe, Qt62JbAr.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@17/2@3/2
                      Source: C:\Users\user\Desktop\begin.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\begin.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMutant created: NULL
                      Source: C:\Windows\SysWOW64\comp.exeFile created: C:\Users\user\AppData\Local\Temp\-0gK612JJump to behavior
                      Source: begin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: begin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: comp.exe, 0000000E.00000003.2177320629.0000000003334000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2475910554.0000000003334000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: begin.exeVirustotal: Detection: 69%
                      Source: begin.exeReversingLabs: Detection: 52%
                      Source: C:\Users\user\Desktop\begin.exeFile read: C:\Users\user\Desktop\begin.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\begin.exe "C:\Users\user\Desktop\begin.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeProcess created: C:\Windows\SysWOW64\comp.exe "C:\Windows\SysWOW64\comp.exe"
                      Source: C:\Windows\SysWOW64\comp.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeProcess created: C:\Windows\SysWOW64\comp.exe "C:\Windows\SysWOW64\comp.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: ulib.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: ieframe.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: winsqlite3.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                      Source: begin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: begin.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: begin.exeStatic file information: File size 2105712 > 1048576
                      Source: begin.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1b3400
                      Source: begin.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: AddInProcess32.pdb source: comp.exe, 0000000E.00000002.2478515912.0000000003EDC000.00000004.10000000.00040000.00000000.sdmp, comp.exe, 0000000E.00000002.2475910554.00000000032B0000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2478159799.00000000029EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.2295964160.00000000383CC000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: comp.pdb source: AddInProcess32.exe, 0000000B.00000002.1978909211.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000003.1920210364.0000000001114000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: comp.pdbGCTL source: AddInProcess32.exe, 0000000B.00000002.1978909211.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000003.1920210364.0000000001114000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: AddInProcess32.exe, 0000000B.00000002.1979815612.0000000001100000.00000040.00001000.00020000.00000000.sdmp, comp.exe, 0000000E.00000003.1978689528.0000000003542000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.0000000003A4E000.00000040.00001000.00020000.00000000.sdmp, comp.exe, 0000000E.00000003.1980925950.00000000036FC000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.00000000038B0000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: AddInProcess32.exe, AddInProcess32.exe, 0000000B.00000002.1979815612.0000000001100000.00000040.00001000.00020000.00000000.sdmp, comp.exe, comp.exe, 0000000E.00000003.1978689528.0000000003542000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.0000000003A4E000.00000040.00001000.00020000.00000000.sdmp, comp.exe, 0000000E.00000003.1980925950.00000000036FC000.00000004.00000020.00020000.00000000.sdmp, comp.exe, 0000000E.00000002.2478005668.00000000038B0000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: AddInProcess32.pdbpw source: comp.exe, 0000000E.00000002.2478515912.0000000003EDC000.00000004.10000000.00040000.00000000.sdmp, comp.exe, 0000000E.00000002.2475910554.00000000032B0000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2478159799.00000000029EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.2295964160.00000000383CC000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000000.1900733856.000000000073F000.00000002.00000001.01000000.00000009.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2476197228.000000000073F000.00000002.00000001.01000000.00000009.sdmp

                      Data Obfuscation

                      barindex
                      Source: Yara matchFile source: 0.2.begin.exe.5950000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.begin.exe.5950000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.begin.exe.3db9550.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.begin.exe.3db9550.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1898946786.0000000005950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1891732318.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883854982.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: begin.exe PID: 7756, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061ACA92 push 061ACB0Ah; retf 0_2_061ACAEC
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061A9A80 push es; iretd 0_2_061A9AA4
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_06721F50 push es; ret 0_2_06721F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004032D0 push eax; ret 11_2_004032D2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00406B56 push edx; ret 11_2_00406B7D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00417BD0 push edx; ret 11_2_00417BD1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00414C05 pushad ; retf 11_2_00414C08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004074DA push ecx; iretd 11_2_004074F6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00404CE6 push ebx; retf 11_2_00404CE7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040D56F push ebp; retf 11_2_0040D570
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041F573 push esi; iretd 11_2_0041F53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00423D33 push cs; retf 11_2_00423DE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00404DEF push esp; retf 11_2_00404DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004076AA push 7211FBE9h; retf 11_2_004076B1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0110225F pushad ; ret 11_2_011027F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011027FA pushad ; ret 11_2_011027F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011309AD push ecx; mov dword ptr [esp], ecx11_2_011309B6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0110283D push eax; iretd 11_2_01102858
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0110135E push eax; iretd 11_2_01101369
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038B225F pushad ; ret 14_2_038B27F9
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038B27FA pushad ; ret 14_2_038B27F9
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038E09AD push ecx; mov dword ptr [esp], ecx14_2_038E09B6
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038B283D push eax; iretd 14_2_038B2858
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_038B1368 push eax; iretd 14_2_038B1369
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030A43D7 push 7211FBE9h; retf 14_2_030A43DE
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030A4207 push ecx; iretd 14_2_030A4223
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030BC2A0 push esi; iretd 14_2_030BC26B
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030B61AB push es; ret 14_2_030B61AE
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030BC43E push ecx; iretd 14_2_030BC43F
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030C0A60 push cs; retf 14_2_030C0B0D
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030B48FD push edx; ret 14_2_030B48FE
                      Source: begin.exe, Wm89Lqi4.csHigh entropy of concatenated method names: 'Fd40Cbe7', 'Xd96Jsp3', 'e9A5NyLn', 'k7PYx6t9', 'Dt67Gco5', 'a6YGd2c1', 'Ss29WyPm', 'Pb42Zxt0', 'f7QBi40K', 'j4W6Eqb0'
                      Source: begin.exe, Lg4q1YNc.csHigh entropy of concatenated method names: 'n3G9Hkw1', 'MoveNext', 'De2b3L9F', 'SetStateMachine', 'j1Y8Qtb9', 'Cm5p3QPd', 'a0Q1Rky2', 't5R4Zwx2', 'g5ZWj81D', 'De2q1TAy'
                      Source: begin.exe, c7S0XdZf.csHigh entropy of concatenated method names: 'b0RHo6z5', 'Mf63Gqn2', 'i6YAj49F', 'Dz62QcNp', 'i8BRt1x2', 'a0XKj72R', 'o0K1Ceb2', 'i8T4RgBr', 'Xb56Bfw3', 'e8R7DyMz'
                      Source: begin.exe, e1G6Tmw3.csHigh entropy of concatenated method names: 'Nt43CeFj', 'Wt67Akz9', 'No14Dkj5', 'Ms74NpTt', 'a5NBn68R', 'Xq8g0S5A', 'g7QCp98W', 'n5BRy82L', 'Qq2s6A4B', 'y4RAk93S'
                      Source: begin.exe, g2AZi8q5.csHigh entropy of concatenated method names: 'Lm7a4AGe', 'o2JTz7q3', 'Wn91Cbk6', 'Qy13KdRx', 'Ka1d0R9D', 'Eo64BiGf', 'An6j3S5G', 'Sn61Ysy0', 'Zb03Fdr1', 'x9XTt73L'
                      Source: begin.exe, j9MAp5g4.csHigh entropy of concatenated method names: 'k9D6LrQs', 'MoveNext', 'Sr0q6P4G', 'SetStateMachine', 'Gj10CzTg', 'r3NDq79Y', 's0GKd28W', 'Zf82Dpw5', 'Da7p0NAi', 'Er4c9H3G'
                      Source: begin.exe, i4BWg9r1.csHigh entropy of concatenated method names: 'Re1s5MHr', 'e1F8AwBp', 'Xm7n2QFg', 'z4D2NiKs', 'x0Z6RdQb', 'Gx3k8BKi', 'Ln75DkZd', 'k8Q6NnGt', 'Bn3y6Z8G', 'Pk30Hgm1'
                      Source: begin.exe, Qt62JbAr.csHigh entropy of concatenated method names: 's7F3Tgx5', 'MoveNext', 'Lf98Cpt7', 'SetStateMachine', 'Hw20LoTg', 'p2R3AzPi', 'Kw5e7W2D', 'Bd24Wrq6', 'w1XBy4t5', 'Bw02Gej7'

                      Persistence and Installation Behavior

                      barindex
                      Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple high-risk indicators present: 1) The certificate is from a Chinese company (Zero Online Technology) based in Chengdu, which is a higher risk geography. 2) The signature is explicitly invalid with verification failure, which is a critical red flag. 3) There's a major temporal inconsistency - the compilation date (2012) is much older than the certificate validity period (2024-2025), suggesting potential certificate abuse or timestamp manipulation. 4) While the issuer Certum is a known certificate authority, the combination of an invalid signature with a Chinese subject raises significant trust concerns. 5) The compilation timestamp from 2012 is suspiciously old compared to current date (2025), suggesting possible tampering. The only slightly mitigating factor is the use of an Extended Validation (EV) certificate type, but this is overshadowed by the invalid signature and other suspicious indicators.

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\begin.exeFile opened: C:\Users\user\Desktop\begin.exe\:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: begin.exe PID: 7756, type: MEMORYSTR
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372D324
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372D7E4
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372D944
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372D504
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372D544
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372D1E4
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC3730154
                      Source: C:\Windows\SysWOW64\comp.exeAPI/Special instruction interceptor: Address: 7FFCC372DA44
                      Source: C:\Users\user\Desktop\begin.exeSection loaded: OutputDebugStringW count: 1939
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: 2BD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: 2BD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: 8500000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: 9500000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: 96E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: A6E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: AAA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: BAA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: CAA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117096E rdtsc 11_2_0117096E
                      Source: C:\Users\user\Desktop\begin.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeWindow / User API: threadDelayed 3661Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI coverage: 0.7 %
                      Source: C:\Windows\SysWOW64\comp.exeAPI coverage: 2.6 %
                      Source: C:\Users\user\Desktop\begin.exe TID: 7804Thread sleep time: -3661000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\begin.exe TID: 8152Thread sleep time: -66000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\begin.exe TID: 7252Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\begin.exe TID: 7804Thread sleep time: -312000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\begin.exe TID: 7776Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\comp.exeCode function: 14_2_030BC650 FindFirstFileW,FindNextFileW,FindClose,14_2_030BC650
                      Source: C:\Users\user\Desktop\begin.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: begin.exe, 00000000.00000002.1898946786.0000000005950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VBoxTray
                      Source: begin.exe, 00000000.00000002.1898946786.0000000005950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: sandboxierpcssGSOFTWARE\VMware, Inc.\VMware VGAuth
                      Source: comp.exe, 0000000E.00000002.2475910554.00000000032B0000.00000004.00000020.00020000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2477461403.0000000000D49000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.2297461173.000001D1383CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\begin.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\begin.exeCode function: 0_2_061A2340 CheckRemoteDebuggerPresent,0_2_061A2340
                      Source: C:\Users\user\Desktop\begin.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117096E rdtsc 11_2_0117096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00417903 LdrLoadDll,11_2_00417903
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DA118 mov ecx, dword ptr fs:[00000030h]11_2_011DA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DA118 mov eax, dword ptr fs:[00000030h]11_2_011DA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DA118 mov eax, dword ptr fs:[00000030h]11_2_011DA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DA118 mov eax, dword ptr fs:[00000030h]11_2_011DA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F0115 mov eax, dword ptr fs:[00000030h]11_2_011F0115
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov eax, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov ecx, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov eax, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov eax, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov ecx, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov eax, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov eax, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov ecx, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov eax, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE10E mov ecx, dword ptr fs:[00000030h]11_2_011DE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01160124 mov eax, dword ptr fs:[00000030h]11_2_01160124
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112C156 mov eax, dword ptr fs:[00000030h]11_2_0112C156
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C8158 mov eax, dword ptr fs:[00000030h]11_2_011C8158
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204164 mov eax, dword ptr fs:[00000030h]11_2_01204164
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204164 mov eax, dword ptr fs:[00000030h]11_2_01204164
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136154 mov eax, dword ptr fs:[00000030h]11_2_01136154
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136154 mov eax, dword ptr fs:[00000030h]11_2_01136154
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C4144 mov eax, dword ptr fs:[00000030h]11_2_011C4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C4144 mov eax, dword ptr fs:[00000030h]11_2_011C4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C4144 mov ecx, dword ptr fs:[00000030h]11_2_011C4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C4144 mov eax, dword ptr fs:[00000030h]11_2_011C4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C4144 mov eax, dword ptr fs:[00000030h]11_2_011C4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B019F mov eax, dword ptr fs:[00000030h]11_2_011B019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B019F mov eax, dword ptr fs:[00000030h]11_2_011B019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B019F mov eax, dword ptr fs:[00000030h]11_2_011B019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B019F mov eax, dword ptr fs:[00000030h]11_2_011B019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112A197 mov eax, dword ptr fs:[00000030h]11_2_0112A197
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112A197 mov eax, dword ptr fs:[00000030h]11_2_0112A197
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112A197 mov eax, dword ptr fs:[00000030h]11_2_0112A197
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01170185 mov eax, dword ptr fs:[00000030h]11_2_01170185
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EC188 mov eax, dword ptr fs:[00000030h]11_2_011EC188
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EC188 mov eax, dword ptr fs:[00000030h]11_2_011EC188
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D4180 mov eax, dword ptr fs:[00000030h]11_2_011D4180
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D4180 mov eax, dword ptr fs:[00000030h]11_2_011D4180
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_012061E5 mov eax, dword ptr fs:[00000030h]11_2_012061E5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE1D0 mov eax, dword ptr fs:[00000030h]11_2_011AE1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE1D0 mov eax, dword ptr fs:[00000030h]11_2_011AE1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE1D0 mov ecx, dword ptr fs:[00000030h]11_2_011AE1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE1D0 mov eax, dword ptr fs:[00000030h]11_2_011AE1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE1D0 mov eax, dword ptr fs:[00000030h]11_2_011AE1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F61C3 mov eax, dword ptr fs:[00000030h]11_2_011F61C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F61C3 mov eax, dword ptr fs:[00000030h]11_2_011F61C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011601F8 mov eax, dword ptr fs:[00000030h]11_2_011601F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E016 mov eax, dword ptr fs:[00000030h]11_2_0114E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E016 mov eax, dword ptr fs:[00000030h]11_2_0114E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E016 mov eax, dword ptr fs:[00000030h]11_2_0114E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E016 mov eax, dword ptr fs:[00000030h]11_2_0114E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B4000 mov ecx, dword ptr fs:[00000030h]11_2_011B4000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D2000 mov eax, dword ptr fs:[00000030h]11_2_011D2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C6030 mov eax, dword ptr fs:[00000030h]11_2_011C6030
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112A020 mov eax, dword ptr fs:[00000030h]11_2_0112A020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112C020 mov eax, dword ptr fs:[00000030h]11_2_0112C020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01132050 mov eax, dword ptr fs:[00000030h]11_2_01132050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6050 mov eax, dword ptr fs:[00000030h]11_2_011B6050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115C073 mov eax, dword ptr fs:[00000030h]11_2_0115C073
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113208A mov eax, dword ptr fs:[00000030h]11_2_0113208A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F60B8 mov eax, dword ptr fs:[00000030h]11_2_011F60B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F60B8 mov ecx, dword ptr fs:[00000030h]11_2_011F60B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011280A0 mov eax, dword ptr fs:[00000030h]11_2_011280A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C80A8 mov eax, dword ptr fs:[00000030h]11_2_011C80A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B20DE mov eax, dword ptr fs:[00000030h]11_2_011B20DE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112C0F0 mov eax, dword ptr fs:[00000030h]11_2_0112C0F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011720F0 mov ecx, dword ptr fs:[00000030h]11_2_011720F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112A0E3 mov ecx, dword ptr fs:[00000030h]11_2_0112A0E3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011380E9 mov eax, dword ptr fs:[00000030h]11_2_011380E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B60E0 mov eax, dword ptr fs:[00000030h]11_2_011B60E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112C310 mov ecx, dword ptr fs:[00000030h]11_2_0112C310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01208324 mov eax, dword ptr fs:[00000030h]11_2_01208324
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01208324 mov ecx, dword ptr fs:[00000030h]11_2_01208324
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01208324 mov eax, dword ptr fs:[00000030h]11_2_01208324
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01208324 mov eax, dword ptr fs:[00000030h]11_2_01208324
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01150310 mov ecx, dword ptr fs:[00000030h]11_2_01150310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A30B mov eax, dword ptr fs:[00000030h]11_2_0116A30B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A30B mov eax, dword ptr fs:[00000030h]11_2_0116A30B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A30B mov eax, dword ptr fs:[00000030h]11_2_0116A30B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B035C mov eax, dword ptr fs:[00000030h]11_2_011B035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B035C mov eax, dword ptr fs:[00000030h]11_2_011B035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B035C mov eax, dword ptr fs:[00000030h]11_2_011B035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B035C mov ecx, dword ptr fs:[00000030h]11_2_011B035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B035C mov eax, dword ptr fs:[00000030h]11_2_011B035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B035C mov eax, dword ptr fs:[00000030h]11_2_011B035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FA352 mov eax, dword ptr fs:[00000030h]11_2_011FA352
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D8350 mov ecx, dword ptr fs:[00000030h]11_2_011D8350
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B2349 mov eax, dword ptr fs:[00000030h]11_2_011B2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D437C mov eax, dword ptr fs:[00000030h]11_2_011D437C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0120634F mov eax, dword ptr fs:[00000030h]11_2_0120634F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01128397 mov eax, dword ptr fs:[00000030h]11_2_01128397
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01128397 mov eax, dword ptr fs:[00000030h]11_2_01128397
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01128397 mov eax, dword ptr fs:[00000030h]11_2_01128397
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112E388 mov eax, dword ptr fs:[00000030h]11_2_0112E388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112E388 mov eax, dword ptr fs:[00000030h]11_2_0112E388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112E388 mov eax, dword ptr fs:[00000030h]11_2_0112E388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115438F mov eax, dword ptr fs:[00000030h]11_2_0115438F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115438F mov eax, dword ptr fs:[00000030h]11_2_0115438F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE3DB mov eax, dword ptr fs:[00000030h]11_2_011DE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE3DB mov eax, dword ptr fs:[00000030h]11_2_011DE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE3DB mov ecx, dword ptr fs:[00000030h]11_2_011DE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DE3DB mov eax, dword ptr fs:[00000030h]11_2_011DE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D43D4 mov eax, dword ptr fs:[00000030h]11_2_011D43D4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D43D4 mov eax, dword ptr fs:[00000030h]11_2_011D43D4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EC3CD mov eax, dword ptr fs:[00000030h]11_2_011EC3CD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A3C0 mov eax, dword ptr fs:[00000030h]11_2_0113A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A3C0 mov eax, dword ptr fs:[00000030h]11_2_0113A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A3C0 mov eax, dword ptr fs:[00000030h]11_2_0113A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A3C0 mov eax, dword ptr fs:[00000030h]11_2_0113A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A3C0 mov eax, dword ptr fs:[00000030h]11_2_0113A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A3C0 mov eax, dword ptr fs:[00000030h]11_2_0113A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011383C0 mov eax, dword ptr fs:[00000030h]11_2_011383C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011383C0 mov eax, dword ptr fs:[00000030h]11_2_011383C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011383C0 mov eax, dword ptr fs:[00000030h]11_2_011383C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011383C0 mov eax, dword ptr fs:[00000030h]11_2_011383C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B63C0 mov eax, dword ptr fs:[00000030h]11_2_011B63C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E3F0 mov eax, dword ptr fs:[00000030h]11_2_0114E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E3F0 mov eax, dword ptr fs:[00000030h]11_2_0114E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E3F0 mov eax, dword ptr fs:[00000030h]11_2_0114E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011663FF mov eax, dword ptr fs:[00000030h]11_2_011663FF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011403E9 mov eax, dword ptr fs:[00000030h]11_2_011403E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112823B mov eax, dword ptr fs:[00000030h]11_2_0112823B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112A250 mov eax, dword ptr fs:[00000030h]11_2_0112A250
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136259 mov eax, dword ptr fs:[00000030h]11_2_01136259
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EA250 mov eax, dword ptr fs:[00000030h]11_2_011EA250
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EA250 mov eax, dword ptr fs:[00000030h]11_2_011EA250
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B8243 mov eax, dword ptr fs:[00000030h]11_2_011B8243
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B8243 mov ecx, dword ptr fs:[00000030h]11_2_011B8243
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E0274 mov eax, dword ptr fs:[00000030h]11_2_011E0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134260 mov eax, dword ptr fs:[00000030h]11_2_01134260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134260 mov eax, dword ptr fs:[00000030h]11_2_01134260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134260 mov eax, dword ptr fs:[00000030h]11_2_01134260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112826B mov eax, dword ptr fs:[00000030h]11_2_0112826B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0120625D mov eax, dword ptr fs:[00000030h]11_2_0120625D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E284 mov eax, dword ptr fs:[00000030h]11_2_0116E284
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E284 mov eax, dword ptr fs:[00000030h]11_2_0116E284
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B0283 mov eax, dword ptr fs:[00000030h]11_2_011B0283
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B0283 mov eax, dword ptr fs:[00000030h]11_2_011B0283
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B0283 mov eax, dword ptr fs:[00000030h]11_2_011B0283
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011402A0 mov eax, dword ptr fs:[00000030h]11_2_011402A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011402A0 mov eax, dword ptr fs:[00000030h]11_2_011402A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C62A0 mov eax, dword ptr fs:[00000030h]11_2_011C62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C62A0 mov ecx, dword ptr fs:[00000030h]11_2_011C62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C62A0 mov eax, dword ptr fs:[00000030h]11_2_011C62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C62A0 mov eax, dword ptr fs:[00000030h]11_2_011C62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C62A0 mov eax, dword ptr fs:[00000030h]11_2_011C62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C62A0 mov eax, dword ptr fs:[00000030h]11_2_011C62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A2C3 mov eax, dword ptr fs:[00000030h]11_2_0113A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A2C3 mov eax, dword ptr fs:[00000030h]11_2_0113A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A2C3 mov eax, dword ptr fs:[00000030h]11_2_0113A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A2C3 mov eax, dword ptr fs:[00000030h]11_2_0113A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A2C3 mov eax, dword ptr fs:[00000030h]11_2_0113A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011402E1 mov eax, dword ptr fs:[00000030h]11_2_011402E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011402E1 mov eax, dword ptr fs:[00000030h]11_2_011402E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011402E1 mov eax, dword ptr fs:[00000030h]11_2_011402E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_012062D6 mov eax, dword ptr fs:[00000030h]11_2_012062D6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C6500 mov eax, dword ptr fs:[00000030h]11_2_011C6500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204500 mov eax, dword ptr fs:[00000030h]11_2_01204500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140535 mov eax, dword ptr fs:[00000030h]11_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140535 mov eax, dword ptr fs:[00000030h]11_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140535 mov eax, dword ptr fs:[00000030h]11_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140535 mov eax, dword ptr fs:[00000030h]11_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140535 mov eax, dword ptr fs:[00000030h]11_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140535 mov eax, dword ptr fs:[00000030h]11_2_01140535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E53E mov eax, dword ptr fs:[00000030h]11_2_0115E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E53E mov eax, dword ptr fs:[00000030h]11_2_0115E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E53E mov eax, dword ptr fs:[00000030h]11_2_0115E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E53E mov eax, dword ptr fs:[00000030h]11_2_0115E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E53E mov eax, dword ptr fs:[00000030h]11_2_0115E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01138550 mov eax, dword ptr fs:[00000030h]11_2_01138550
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01138550 mov eax, dword ptr fs:[00000030h]11_2_01138550
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116656A mov eax, dword ptr fs:[00000030h]11_2_0116656A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116656A mov eax, dword ptr fs:[00000030h]11_2_0116656A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116656A mov eax, dword ptr fs:[00000030h]11_2_0116656A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E59C mov eax, dword ptr fs:[00000030h]11_2_0116E59C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01132582 mov eax, dword ptr fs:[00000030h]11_2_01132582
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01132582 mov ecx, dword ptr fs:[00000030h]11_2_01132582
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01164588 mov eax, dword ptr fs:[00000030h]11_2_01164588
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011545B1 mov eax, dword ptr fs:[00000030h]11_2_011545B1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011545B1 mov eax, dword ptr fs:[00000030h]11_2_011545B1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B05A7 mov eax, dword ptr fs:[00000030h]11_2_011B05A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B05A7 mov eax, dword ptr fs:[00000030h]11_2_011B05A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B05A7 mov eax, dword ptr fs:[00000030h]11_2_011B05A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011365D0 mov eax, dword ptr fs:[00000030h]11_2_011365D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A5D0 mov eax, dword ptr fs:[00000030h]11_2_0116A5D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A5D0 mov eax, dword ptr fs:[00000030h]11_2_0116A5D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E5CF mov eax, dword ptr fs:[00000030h]11_2_0116E5CF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E5CF mov eax, dword ptr fs:[00000030h]11_2_0116E5CF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E5E7 mov eax, dword ptr fs:[00000030h]11_2_0115E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011325E0 mov eax, dword ptr fs:[00000030h]11_2_011325E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C5ED mov eax, dword ptr fs:[00000030h]11_2_0116C5ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C5ED mov eax, dword ptr fs:[00000030h]11_2_0116C5ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01168402 mov eax, dword ptr fs:[00000030h]11_2_01168402
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01168402 mov eax, dword ptr fs:[00000030h]11_2_01168402
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01168402 mov eax, dword ptr fs:[00000030h]11_2_01168402
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A430 mov eax, dword ptr fs:[00000030h]11_2_0116A430
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112E420 mov eax, dword ptr fs:[00000030h]11_2_0112E420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112E420 mov eax, dword ptr fs:[00000030h]11_2_0112E420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112E420 mov eax, dword ptr fs:[00000030h]11_2_0112E420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112C427 mov eax, dword ptr fs:[00000030h]11_2_0112C427
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B6420 mov eax, dword ptr fs:[00000030h]11_2_011B6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EA456 mov eax, dword ptr fs:[00000030h]11_2_011EA456
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112645D mov eax, dword ptr fs:[00000030h]11_2_0112645D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115245A mov eax, dword ptr fs:[00000030h]11_2_0115245A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116E443 mov eax, dword ptr fs:[00000030h]11_2_0116E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115A470 mov eax, dword ptr fs:[00000030h]11_2_0115A470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115A470 mov eax, dword ptr fs:[00000030h]11_2_0115A470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115A470 mov eax, dword ptr fs:[00000030h]11_2_0115A470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BC460 mov ecx, dword ptr fs:[00000030h]11_2_011BC460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011EA49A mov eax, dword ptr fs:[00000030h]11_2_011EA49A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011644B0 mov ecx, dword ptr fs:[00000030h]11_2_011644B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BA4B0 mov eax, dword ptr fs:[00000030h]11_2_011BA4B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011364AB mov eax, dword ptr fs:[00000030h]11_2_011364AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011304E5 mov ecx, dword ptr fs:[00000030h]11_2_011304E5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130710 mov eax, dword ptr fs:[00000030h]11_2_01130710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01160710 mov eax, dword ptr fs:[00000030h]11_2_01160710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C700 mov eax, dword ptr fs:[00000030h]11_2_0116C700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116273C mov eax, dword ptr fs:[00000030h]11_2_0116273C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116273C mov ecx, dword ptr fs:[00000030h]11_2_0116273C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116273C mov eax, dword ptr fs:[00000030h]11_2_0116273C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AC730 mov eax, dword ptr fs:[00000030h]11_2_011AC730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C720 mov eax, dword ptr fs:[00000030h]11_2_0116C720
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C720 mov eax, dword ptr fs:[00000030h]11_2_0116C720
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130750 mov eax, dword ptr fs:[00000030h]11_2_01130750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BE75D mov eax, dword ptr fs:[00000030h]11_2_011BE75D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172750 mov eax, dword ptr fs:[00000030h]11_2_01172750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172750 mov eax, dword ptr fs:[00000030h]11_2_01172750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B4755 mov eax, dword ptr fs:[00000030h]11_2_011B4755
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116674D mov esi, dword ptr fs:[00000030h]11_2_0116674D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116674D mov eax, dword ptr fs:[00000030h]11_2_0116674D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116674D mov eax, dword ptr fs:[00000030h]11_2_0116674D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01138770 mov eax, dword ptr fs:[00000030h]11_2_01138770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140770 mov eax, dword ptr fs:[00000030h]11_2_01140770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D678E mov eax, dword ptr fs:[00000030h]11_2_011D678E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011307AF mov eax, dword ptr fs:[00000030h]11_2_011307AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E47A0 mov eax, dword ptr fs:[00000030h]11_2_011E47A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113C7C0 mov eax, dword ptr fs:[00000030h]11_2_0113C7C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B07C3 mov eax, dword ptr fs:[00000030h]11_2_011B07C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011347FB mov eax, dword ptr fs:[00000030h]11_2_011347FB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011347FB mov eax, dword ptr fs:[00000030h]11_2_011347FB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011527ED mov eax, dword ptr fs:[00000030h]11_2_011527ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011527ED mov eax, dword ptr fs:[00000030h]11_2_011527ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011527ED mov eax, dword ptr fs:[00000030h]11_2_011527ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BE7E1 mov eax, dword ptr fs:[00000030h]11_2_011BE7E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01172619 mov eax, dword ptr fs:[00000030h]11_2_01172619
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE609 mov eax, dword ptr fs:[00000030h]11_2_011AE609
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114260B mov eax, dword ptr fs:[00000030h]11_2_0114260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114E627 mov eax, dword ptr fs:[00000030h]11_2_0114E627
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01166620 mov eax, dword ptr fs:[00000030h]11_2_01166620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01168620 mov eax, dword ptr fs:[00000030h]11_2_01168620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113262C mov eax, dword ptr fs:[00000030h]11_2_0113262C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0114C640 mov eax, dword ptr fs:[00000030h]11_2_0114C640
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01162674 mov eax, dword ptr fs:[00000030h]11_2_01162674
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F866E mov eax, dword ptr fs:[00000030h]11_2_011F866E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F866E mov eax, dword ptr fs:[00000030h]11_2_011F866E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A660 mov eax, dword ptr fs:[00000030h]11_2_0116A660
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A660 mov eax, dword ptr fs:[00000030h]11_2_0116A660
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134690 mov eax, dword ptr fs:[00000030h]11_2_01134690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134690 mov eax, dword ptr fs:[00000030h]11_2_01134690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011666B0 mov eax, dword ptr fs:[00000030h]11_2_011666B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C6A6 mov eax, dword ptr fs:[00000030h]11_2_0116C6A6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A6C7 mov ebx, dword ptr fs:[00000030h]11_2_0116A6C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A6C7 mov eax, dword ptr fs:[00000030h]11_2_0116A6C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE6F2 mov eax, dword ptr fs:[00000030h]11_2_011AE6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE6F2 mov eax, dword ptr fs:[00000030h]11_2_011AE6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE6F2 mov eax, dword ptr fs:[00000030h]11_2_011AE6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE6F2 mov eax, dword ptr fs:[00000030h]11_2_011AE6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B06F1 mov eax, dword ptr fs:[00000030h]11_2_011B06F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B06F1 mov eax, dword ptr fs:[00000030h]11_2_011B06F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BC912 mov eax, dword ptr fs:[00000030h]11_2_011BC912
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01128918 mov eax, dword ptr fs:[00000030h]11_2_01128918
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01128918 mov eax, dword ptr fs:[00000030h]11_2_01128918
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE908 mov eax, dword ptr fs:[00000030h]11_2_011AE908
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AE908 mov eax, dword ptr fs:[00000030h]11_2_011AE908
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B892A mov eax, dword ptr fs:[00000030h]11_2_011B892A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C892B mov eax, dword ptr fs:[00000030h]11_2_011C892B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B0946 mov eax, dword ptr fs:[00000030h]11_2_011B0946
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204940 mov eax, dword ptr fs:[00000030h]11_2_01204940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D4978 mov eax, dword ptr fs:[00000030h]11_2_011D4978
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D4978 mov eax, dword ptr fs:[00000030h]11_2_011D4978
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BC97C mov eax, dword ptr fs:[00000030h]11_2_011BC97C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01156962 mov eax, dword ptr fs:[00000030h]11_2_01156962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01156962 mov eax, dword ptr fs:[00000030h]11_2_01156962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01156962 mov eax, dword ptr fs:[00000030h]11_2_01156962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117096E mov eax, dword ptr fs:[00000030h]11_2_0117096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117096E mov edx, dword ptr fs:[00000030h]11_2_0117096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0117096E mov eax, dword ptr fs:[00000030h]11_2_0117096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B89B3 mov esi, dword ptr fs:[00000030h]11_2_011B89B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B89B3 mov eax, dword ptr fs:[00000030h]11_2_011B89B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011B89B3 mov eax, dword ptr fs:[00000030h]11_2_011B89B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011429A0 mov eax, dword ptr fs:[00000030h]11_2_011429A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011309AD mov eax, dword ptr fs:[00000030h]11_2_011309AD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011309AD mov eax, dword ptr fs:[00000030h]11_2_011309AD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A9D0 mov eax, dword ptr fs:[00000030h]11_2_0113A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A9D0 mov eax, dword ptr fs:[00000030h]11_2_0113A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A9D0 mov eax, dword ptr fs:[00000030h]11_2_0113A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A9D0 mov eax, dword ptr fs:[00000030h]11_2_0113A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A9D0 mov eax, dword ptr fs:[00000030h]11_2_0113A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113A9D0 mov eax, dword ptr fs:[00000030h]11_2_0113A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011649D0 mov eax, dword ptr fs:[00000030h]11_2_011649D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FA9D3 mov eax, dword ptr fs:[00000030h]11_2_011FA9D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C69C0 mov eax, dword ptr fs:[00000030h]11_2_011C69C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011629F9 mov eax, dword ptr fs:[00000030h]11_2_011629F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011629F9 mov eax, dword ptr fs:[00000030h]11_2_011629F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BE9E0 mov eax, dword ptr fs:[00000030h]11_2_011BE9E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BC810 mov eax, dword ptr fs:[00000030h]11_2_011BC810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152835 mov eax, dword ptr fs:[00000030h]11_2_01152835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152835 mov eax, dword ptr fs:[00000030h]11_2_01152835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152835 mov eax, dword ptr fs:[00000030h]11_2_01152835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152835 mov ecx, dword ptr fs:[00000030h]11_2_01152835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152835 mov eax, dword ptr fs:[00000030h]11_2_01152835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01152835 mov eax, dword ptr fs:[00000030h]11_2_01152835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116A830 mov eax, dword ptr fs:[00000030h]11_2_0116A830
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D483A mov eax, dword ptr fs:[00000030h]11_2_011D483A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D483A mov eax, dword ptr fs:[00000030h]11_2_011D483A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01160854 mov eax, dword ptr fs:[00000030h]11_2_01160854
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134859 mov eax, dword ptr fs:[00000030h]11_2_01134859
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01134859 mov eax, dword ptr fs:[00000030h]11_2_01134859
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01142840 mov ecx, dword ptr fs:[00000030h]11_2_01142840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BE872 mov eax, dword ptr fs:[00000030h]11_2_011BE872
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BE872 mov eax, dword ptr fs:[00000030h]11_2_011BE872
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C6870 mov eax, dword ptr fs:[00000030h]11_2_011C6870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C6870 mov eax, dword ptr fs:[00000030h]11_2_011C6870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BC89D mov eax, dword ptr fs:[00000030h]11_2_011BC89D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130887 mov eax, dword ptr fs:[00000030h]11_2_01130887
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115E8C0 mov eax, dword ptr fs:[00000030h]11_2_0115E8C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_012008C0 mov eax, dword ptr fs:[00000030h]11_2_012008C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C8F9 mov eax, dword ptr fs:[00000030h]11_2_0116C8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116C8F9 mov eax, dword ptr fs:[00000030h]11_2_0116C8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FA8E4 mov eax, dword ptr fs:[00000030h]11_2_011FA8E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011AEB1D mov eax, dword ptr fs:[00000030h]11_2_011AEB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204B00 mov eax, dword ptr fs:[00000030h]11_2_01204B00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115EB20 mov eax, dword ptr fs:[00000030h]11_2_0115EB20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115EB20 mov eax, dword ptr fs:[00000030h]11_2_0115EB20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F8B28 mov eax, dword ptr fs:[00000030h]11_2_011F8B28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011F8B28 mov eax, dword ptr fs:[00000030h]11_2_011F8B28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01128B50 mov eax, dword ptr fs:[00000030h]11_2_01128B50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DEB50 mov eax, dword ptr fs:[00000030h]11_2_011DEB50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E4B4B mov eax, dword ptr fs:[00000030h]11_2_011E4B4B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E4B4B mov eax, dword ptr fs:[00000030h]11_2_011E4B4B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C6B40 mov eax, dword ptr fs:[00000030h]11_2_011C6B40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011C6B40 mov eax, dword ptr fs:[00000030h]11_2_011C6B40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011FAB40 mov eax, dword ptr fs:[00000030h]11_2_011FAB40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011D8B42 mov eax, dword ptr fs:[00000030h]11_2_011D8B42
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0112CB7E mov eax, dword ptr fs:[00000030h]11_2_0112CB7E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01202B57 mov eax, dword ptr fs:[00000030h]11_2_01202B57
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01202B57 mov eax, dword ptr fs:[00000030h]11_2_01202B57
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01202B57 mov eax, dword ptr fs:[00000030h]11_2_01202B57
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01202B57 mov eax, dword ptr fs:[00000030h]11_2_01202B57
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140BBE mov eax, dword ptr fs:[00000030h]11_2_01140BBE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140BBE mov eax, dword ptr fs:[00000030h]11_2_01140BBE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E4BB0 mov eax, dword ptr fs:[00000030h]11_2_011E4BB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011E4BB0 mov eax, dword ptr fs:[00000030h]11_2_011E4BB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DEBD0 mov eax, dword ptr fs:[00000030h]11_2_011DEBD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01150BCB mov eax, dword ptr fs:[00000030h]11_2_01150BCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01150BCB mov eax, dword ptr fs:[00000030h]11_2_01150BCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01150BCB mov eax, dword ptr fs:[00000030h]11_2_01150BCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130BCD mov eax, dword ptr fs:[00000030h]11_2_01130BCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130BCD mov eax, dword ptr fs:[00000030h]11_2_01130BCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01130BCD mov eax, dword ptr fs:[00000030h]11_2_01130BCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01138BF0 mov eax, dword ptr fs:[00000030h]11_2_01138BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01138BF0 mov eax, dword ptr fs:[00000030h]11_2_01138BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01138BF0 mov eax, dword ptr fs:[00000030h]11_2_01138BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115EBFC mov eax, dword ptr fs:[00000030h]11_2_0115EBFC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BCBF0 mov eax, dword ptr fs:[00000030h]11_2_011BCBF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011BCA11 mov eax, dword ptr fs:[00000030h]11_2_011BCA11
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01154A35 mov eax, dword ptr fs:[00000030h]11_2_01154A35
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01154A35 mov eax, dword ptr fs:[00000030h]11_2_01154A35
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116CA38 mov eax, dword ptr fs:[00000030h]11_2_0116CA38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116CA24 mov eax, dword ptr fs:[00000030h]11_2_0116CA24
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0115EA2E mov eax, dword ptr fs:[00000030h]11_2_0115EA2E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01136A50 mov eax, dword ptr fs:[00000030h]11_2_01136A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140A5B mov eax, dword ptr fs:[00000030h]11_2_01140A5B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01140A5B mov eax, dword ptr fs:[00000030h]11_2_01140A5B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011ACA72 mov eax, dword ptr fs:[00000030h]11_2_011ACA72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011ACA72 mov eax, dword ptr fs:[00000030h]11_2_011ACA72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116CA6F mov eax, dword ptr fs:[00000030h]11_2_0116CA6F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116CA6F mov eax, dword ptr fs:[00000030h]11_2_0116CA6F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0116CA6F mov eax, dword ptr fs:[00000030h]11_2_0116CA6F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_011DEA60 mov eax, dword ptr fs:[00000030h]11_2_011DEA60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01168A90 mov edx, dword ptr fs:[00000030h]11_2_01168A90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0113EA80 mov eax, dword ptr fs:[00000030h]11_2_0113EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_01204A80 mov eax, dword ptr fs:[00000030h]11_2_01204A80
                      Source: C:\Users\user\Desktop\begin.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\begin.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtCreateFile: Direct from: 0x77752FECJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtOpenFile: Direct from: 0x77752DCCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtSetInformationThread: Direct from: 0x777463F9Jump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtQueryInformationToken: Direct from: 0x77752CACJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtProtectVirtualMemory: Direct from: 0x77752F9CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtSetInformationProcess: Direct from: 0x77752C5CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtNotifyChangeKey: Direct from: 0x77753C2CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtOpenKeyEx: Direct from: 0x77752B9CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtOpenSection: Direct from: 0x77752E0CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtAllocateVirtualMemory: Direct from: 0x777548ECJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtQueryVolumeInformationFile: Direct from: 0x77752F2CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtQuerySystemInformation: Direct from: 0x777548CCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtAllocateVirtualMemory: Direct from: 0x77752BECJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtDeviceIoControlFile: Direct from: 0x77752AECJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtCreateUserProcess: Direct from: 0x7775371CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtWriteVirtualMemory: Direct from: 0x7775490CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtQueryInformationProcess: Direct from: 0x77752C26Jump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtResumeThread: Direct from: 0x77752FBCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtReadVirtualMemory: Direct from: 0x77752E8CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtCreateKey: Direct from: 0x77752C6CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtSetInformationThread: Direct from: 0x77752B4CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtQueryAttributesFile: Direct from: 0x77752E6CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtAllocateVirtualMemory: Direct from: 0x77753C9CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtClose: Direct from: 0x77752B6C
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtCreateMutant: Direct from: 0x777535CCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtWriteVirtualMemory: Direct from: 0x77752E3CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtMapViewOfSection: Direct from: 0x77752D1CJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtResumeThread: Direct from: 0x777536ACJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtReadFile: Direct from: 0x77752ADCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtQuerySystemInformation: Direct from: 0x77752DFCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtDelayExecution: Direct from: 0x77752DDCJump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeNtAllocateVirtualMemory: Direct from: 0x77752BFCJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\SysWOW64\comp.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: NULL target: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: NULL target: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeThread register set: target process: 2888Jump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeThread APC queued: target process: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 869008Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\begin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Program Files (x86)\uXYLebzMvjIrFwxFwwJmmMKFsNsxjeRurHXcybKLYavcJStbrel\fMCYiMEFQZmFBs7vgZ5.exeProcess created: C:\Windows\SysWOW64\comp.exe "C:\Windows\SysWOW64\comp.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                      Source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000002.2476377272.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000000.1901608584.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000000.2057492803.0000000001020000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
                      Source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000002.2476377272.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000000.1901608584.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000000.2057492803.0000000001020000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000002.2476377272.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000000.1901608584.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000000.2057492803.0000000001020000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000002.2476377272.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000D.00000000.1901608584.0000000001680000.00000002.00000001.00040000.00000000.sdmp, fMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000000.2057492803.0000000001020000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Users\user\Desktop\begin.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\begin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2477632033.00000000034C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1979345858.0000000001040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1978397440.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2477550350.0000000003470000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2474981906.00000000030A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2479750364.0000000004E20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1981382143.0000000002050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2477132042.00000000037A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\SysWOW64\comp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2477632033.00000000034C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1979345858.0000000001040000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1978397440.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2477550350.0000000003470000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2474981906.00000000030A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2479750364.0000000004E20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.1981382143.0000000002050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2477132042.00000000037A0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      Windows Management Instrumentation1
                      Valid Accounts
                      1
                      Valid Accounts
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      221
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      DLL Side-Loading
                      1
                      Access Token Manipulation
                      1
                      Valid Accounts
                      LSASS Memory2
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      3
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)612
                      Process Injection
                      1
                      Access Token Manipulation
                      Security Account Manager141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares1
                      Data from Local System
                      4
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Abuse Elevation Control Mechanism
                      1
                      Disable or Modify Tools
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture4
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      DLL Side-Loading
                      141
                      Virtualization/Sandbox Evasion
                      LSA Secrets2
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts612
                      Process Injection
                      Cached Domain Credentials113
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                      Deobfuscate/Decode Files or Information
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Hidden Files and Directories
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Abuse Elevation Control Mechanism
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron3
                      Obfuscated Files or Information
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                      DLL Side-Loading
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632014 Sample: begin.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 37 www.micusa.xyz 2->37 39 www.layunin.xyz 2->39 41 www.kdrqcyusevx.info 2->41 47 Suricata IDS alerts for network traffic 2->47 49 Antivirus detection for URL or domain 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 55 6 other signatures 2->55 10 begin.exe 3 2->10         started        signatures3 53 Performs DNS queries to domains with low reputation 39->53 process4 file5 35 C:\Users\user\AppData\Local\...\begin.exe.log, ASCII 10->35 dropped 67 Writes to foreign memory regions 10->67 69 Allocates memory in foreign processes 10->69 71 Tries to delay execution (extensive OutputDebugStringW loop) 10->71 73 3 other signatures 10->73 14 AddInProcess32.exe 10->14         started        17 AddInProcess32.exe 10->17         started        19 AddInProcess32.exe 10->19         started        21 3 other processes 10->21 signatures6 process7 signatures8 75 Maps a DLL or memory area into another process 14->75 23 fMCYiMEFQZmFBs7vgZ5.exe 14->23 injected process9 signatures10 57 Found direct / indirect Syscall (likely to bypass EDR) 23->57 26 comp.exe 13 23->26         started        process11 signatures12 59 Tries to steal Mail credentials (via file / registry access) 26->59 61 Tries to harvest and steal browser information (history, passwords, etc) 26->61 63 Modifies the context of a thread in another process (thread injection) 26->63 65 3 other signatures 26->65 29 fMCYiMEFQZmFBs7vgZ5.exe 26->29 injected 33 firefox.exe 26->33         started        process13 dnsIp14 43 www.kdrqcyusevx.info 104.21.64.1, 49725, 49726, 49727 CLOUDFLARENETUS United States 29->43 45 www.layunin.xyz 13.248.169.48, 49724, 49729, 49730 AMAZON-02US United States 29->45 77 Found direct / indirect Syscall (likely to bypass EDR) 29->77 signatures15

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      begin.exe69%VirustotalBrowse
                      begin.exe53%ReversingLabsWin32.Trojan.CrypterX
                      begin.exe100%AviraTR/Kryptik.guogq
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.kdrqcyusevx.info/z84n/100%Avira URL Cloudmalware
                      https://api.socialmediaplatform.com/postSSocial0%Avira URL Cloudsafe
                      http://www.layunin.xyz/s9ur/0%Avira URL Cloudsafe
                      http://www.ascendercorp.com/typedesigners.htmlmm0%Avira URL Cloudsafe
                      http://www.layunin.xyz0%Avira URL Cloudsafe
                      https://api.yourcloudservice.com/syncUData0%Avira URL Cloudsafe
                      http://www.kdrqcyusevx.info/z84n/?68ZDJP=o7gPcljrbuMGgdsd1LsQM10lReUDL49ypO1I11GlE9lyPwKxV3D/8LWT1eQFq4eHx6tatYqwXiNpfkH1tWmFEu8+AQQ9oryPELiqSvHC/WMcIDoq6daKMeU=&G4JD=1Deh6h3H100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      www.kdrqcyusevx.info
                      104.21.64.1
                      truefalse
                        high
                        www.micusa.xyz
                        13.248.169.48
                        truetrue
                          unknown
                          www.layunin.xyz
                          13.248.169.48
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            http://www.kdrqcyusevx.info/z84n/true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.layunin.xyz/s9ur/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.kdrqcyusevx.info/z84n/?68ZDJP=o7gPcljrbuMGgdsd1LsQM10lReUDL49ypO1I11GlE9lyPwKxV3D/8LWT1eQFq4eHx6tatYqwXiNpfkH1tWmFEu8+AQQ9oryPELiqSvHC/WMcIDoq6daKMeU=&G4JD=1Deh6h3Htrue
                            • Avira URL Cloud: malware
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://cevcsca2021.ocsp-certum.com07begin.exefalse
                              high
                              http://www.apache.org/licenses/LICENSE-2.0begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.combegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/?begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/bThebegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designers?begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://api.socialmediaplatform.com/postSSocialbegin.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.tiro.combegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ac.ecosia.org?q=comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.com/designersbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0wbegin.exefalse
                                                        high
                                                        https://www.certum.pl/CPS0begin.exefalse
                                                          high
                                                          http://repository.certum.pl/cevcsca2021.cer0begin.exefalse
                                                            high
                                                            http://www.ascendercorp.com/typedesigners.htmlmmbegin.exe, 00000000.00000002.1901822268.0000000006760000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.carterandcone.comlbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sajatypeworks.combegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.typography.netDbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.google.com/images/branding/product/ico/googleg_alldp.icocomp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.fontbureau.com/designers/cabarga.htmlNbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.founder.com.cn/cn/cThebegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.galapagosdesign.com/staff/dennis.htmbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.founder.com.cn/cnbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.ecosia.org/newtab/v20comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.fontbureau.com/designers/frere-user.htmlbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.layunin.xyzfMCYiMEFQZmFBs7vgZ5.exe, 0000000F.00000002.2479750364.0000000004EE1000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://api.yourcloudservice.com/syncUDatabegin.exefalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://duckduckgo.com/chrome_newtabv20comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://subca.ocsp-certum.com02begin.exefalse
                                                                                    high
                                                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcomp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.jiyu-kobo.co.jp/begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://crl.certum.pl/ctnca2.crl0lbegin.exefalse
                                                                                          high
                                                                                          http://repository.certum.pl/ctnca2.cer09begin.exefalse
                                                                                            high
                                                                                            http://www.galapagosdesign.com/DPleasebegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://www.fontbureau.com/designers8begin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://www.fonts.combegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://www.urwpp.deDPleasebegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://www.zhongyicts.com.cnbegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://www.sakkal.combegin.exe, 00000000.00000002.1902878646.00000000078F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://www.certum.pl/CPS0begin.exefalse
                                                                                                            high
                                                                                                            https://gemini.google.com/app?q=comp.exe, 0000000E.00000003.2188723573.000000000822E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              • No. of IPs < 25%
                                                                                                              • 25% < No. of IPs < 50%
                                                                                                              • 50% < No. of IPs < 75%
                                                                                                              • 75% < No. of IPs
                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                              13.248.169.48
                                                                                                              www.micusa.xyzUnited States
                                                                                                              16509AMAZON-02USfalse
                                                                                                              104.21.64.1
                                                                                                              www.kdrqcyusevx.infoUnited States
                                                                                                              13335CLOUDFLARENETUSfalse
                                                                                                              Joe Sandbox version:42.0.0 Malachite
                                                                                                              Analysis ID:1632014
                                                                                                              Start date and time:2025-03-07 18:30:46 +01:00
                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                              Overall analysis duration:0h 8m 38s
                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                              Report type:full
                                                                                                              Cookbook file name:default.jbs
                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                              Number of analysed new started processes analysed:18
                                                                                                              Number of new started drivers analysed:0
                                                                                                              Number of existing processes analysed:0
                                                                                                              Number of existing drivers analysed:0
                                                                                                              Number of injected processes analysed:2
                                                                                                              Technologies:
                                                                                                              • HCA enabled
                                                                                                              • EGA enabled
                                                                                                              • AMSI enabled
                                                                                                              Analysis Mode:default
                                                                                                              Analysis stop reason:Timeout
                                                                                                              Sample name:begin.exe
                                                                                                              Detection:MAL
                                                                                                              Classification:mal100.troj.spyw.evad.winEXE@17/2@3/2
                                                                                                              EGA Information:
                                                                                                              • Successful, ratio: 75%
                                                                                                              HCA Information:
                                                                                                              • Successful, ratio: 92%
                                                                                                              • Number of executed functions: 207
                                                                                                              • Number of non-executed functions: 183
                                                                                                              Cookbook Comments:
                                                                                                              • Found application associated with file extension: .exe
                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                              • Excluded IPs from analysis (whitelisted): 23.199.214.10, 204.79.197.222
                                                                                                              • Excluded domains from analysis (whitelisted): fp.msedge.net, fs.microsoft.com
                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                              TimeTypeDescription
                                                                                                              12:32:21API Interceptor3995x Sleep call for process: begin.exe modified
                                                                                                              12:33:40API Interceptor9x Sleep call for process: comp.exe modified
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              13.248.169.48xtQdwMwu86.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.socialsyndication.xyz/2srh/
                                                                                                              mF8WNclxnv.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                              • www.hypereth.xyz/tnp4/
                                                                                                              lightijak2.1.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.seekmeme.xyz/egei/
                                                                                                              CP07E1clp1.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.goodparents.net/dc25/
                                                                                                              CjbMEPJZ3J.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.neuron.exchange/ndhc/?bnb=z7C9Wuft+WAwQ/Q7KVMHRwfpklbArcoSj5+jhEoH+eHGUhYSu8Lo4yyAaBbLjnHatwFWAJV7egL96m2ja/KW4e7Ub8R2COsca5fcq6kVEBii5UZE8g==&8v4Hv=cpKH3h
                                                                                                              2Stejb80vJ.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.dogebonus.xyz/edvi/
                                                                                                              1x165rHRi9.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.shibfestival.xyz/12mv/
                                                                                                              updated quotation.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.bursagrandfamily.xyz/sk68/
                                                                                                              Payment Invoice ref0306252.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.snapps.xyz/6tzz/
                                                                                                              MV SANTA IRIS.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.omark.xyz/mg63/?R6JTa=AHHqM8butOS4M1iA5lnfonpIBN2SG70NZ12jg5XlQoRW09jgn2SNTd5BbeJBWl4Aep0K&9r=gffl7RDX
                                                                                                              104.21.64.1Payment receipt PO 1437 1_ Payment receipt PO #1437 2.exeGet hashmaliciousLokibotBrowse
                                                                                                              • touxzw.ir/fix/five/fre.php
                                                                                                              Payment.exeGet hashmaliciousLokibotBrowse
                                                                                                              • touxzw.ir/sccc/five/fre.php
                                                                                                              7RryusxiMtHBz80.exeGet hashmaliciousLokibotBrowse
                                                                                                              • touxzw.ir/sss2/five/fre.php
                                                                                                              Request for quotation -6001845515-XLSX.exeGet hashmaliciousLokibotBrowse
                                                                                                              • touxzw.ir/tking3/five/fre.php
                                                                                                              vsf098633534.exeGet hashmaliciousLokibotBrowse
                                                                                                              • touxzw.ir/sccc/five/fre.php
                                                                                                              laser.ps1Get hashmaliciousFormBookBrowse
                                                                                                              • www.lucynoel6465.shop/jgkl/
                                                                                                              UPDATED SOA.pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.shlomi.app/t3l4/
                                                                                                              QUOTE OF DRY DOCK REPAIR.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.arryongro-nambe.live/ljgq/
                                                                                                              QUOTATION NO REQ-19-000640.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.askvtwv8.top/2875/
                                                                                                              Revised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.lucynoel6465.shop/hbfq/
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              www.layunin.xyzRevised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.248.169.48
                                                                                                              wUQm5Euilx.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.248.169.48
                                                                                                              Bd6xt2HKGz.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.248.169.48
                                                                                                              SOA.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.248.169.48
                                                                                                              Payment advice_scancopy.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.248.169.48
                                                                                                              www.micusa.xyzSHIPMENT OF THE ORIGINAL DOCUMENTS.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 13.248.169.48
                                                                                                              www.kdrqcyusevx.infoRFQ - 1239- PERSIAN GULF BIDBOLAND PDH PROJECT-PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.32.1
                                                                                                              r_BBVA_MensajeSWIFT04-03-2025-PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.96.1
                                                                                                              DHL parcel.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.48.1
                                                                                                              DDT-5080-ST233.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.16.1
                                                                                                              PDF SCAN COPY P.O7767.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.64.1
                                                                                                              Purchase Order No. STPL014724.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.48.1
                                                                                                              (BBVA) SWIFT_consulta_de_operaciones 10-02-2025-PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.32.1
                                                                                                              payment slip.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.64.1
                                                                                                              I2DE5rhiJz.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.16.1
                                                                                                              yQoe2Cnj0V.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.21.64.1
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              AMAZON-02US5r3fqt67ew531has4231.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                              • 54.176.161.69
                                                                                                              Lead.Upload.Report.Feb.2025.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 185.166.143.48
                                                                                                              NEW__Review_202591760.svgGet hashmaliciousInvisible JSBrowse
                                                                                                              • 13.33.187.122
                                                                                                              ADFoyxP.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 18.155.192.33
                                                                                                              http://www.fedex.com/officebillingonlineGet hashmaliciousUnknownBrowse
                                                                                                              • 34.209.119.153
                                                                                                              https://www.cake.me/s--6UFs8h4LqTXxVNSd0lsitA--/jay-staffordGet hashmaliciousUnknownBrowse
                                                                                                              • 13.35.58.78
                                                                                                              https://www.cake.me/s--6UFs8h4LqTXxVNSd0lsitA--/jay-staffordGet hashmaliciousUnknownBrowse
                                                                                                              • 52.222.236.71
                                                                                                              http://debbierhoades.gamerealm24.com/Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                                                              • 13.33.187.96
                                                                                                              https://hod.guedaib.ru/oh9Iwk/Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                                                              • 13.33.187.120
                                                                                                              ADFoyxP.exeGet hashmaliciousKeyLogger, StormKitty, VenomRATBrowse
                                                                                                              • 18.244.18.38
                                                                                                              CLOUDFLARENETUSalex12312.exeGet hashmaliciousLummaC Stealer, PureLog StealerBrowse
                                                                                                              • 104.21.48.1
                                                                                                              fuck122112.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                              • 104.21.69.194
                                                                                                              mQRr8Rkorf.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                                                                                                              • 104.21.48.201
                                                                                                              TYqeL76sa1.exeGet hashmaliciousAmadey, GCleaner, LummaC Stealer, PureLog StealerBrowse
                                                                                                              • 104.21.112.1
                                                                                                              NEW__Review_202591760.svgGet hashmaliciousInvisible JSBrowse
                                                                                                              • 104.17.25.14
                                                                                                              cronikxqqq.exeGet hashmaliciousLummaC Stealer, PureLog StealerBrowse
                                                                                                              • 172.67.212.102