Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xFk6x2mrd7.exe

Overview

General Information

Sample name:xFk6x2mrd7.exe
renamed because original name is a hash value
Original sample name:18fd0471029adc5a608cc7c442a97f3a.exe
Analysis ID:1464974
MD5:18fd0471029adc5a608cc7c442a97f3a
SHA1:74854bda1aa3e60c3b6f58e8f77882ac7f958486
SHA256:1e92e176dd94bb165b9ac9a391ed84ad473ae69a44139d2f9765dd56974cee0d
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • xFk6x2mrd7.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\xFk6x2mrd7.exe" MD5: 18FD0471029ADC5A608CC7C442A97F3A)
    • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 6812 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "94.228.166.68:80", "Bot Id": "@MarsSellers12", "Message": "Click Close to exit the program. Error code: 1142", "Authorization Header": "e0c4915670bce95535bec15e4bb6341a"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000002.00000002.1778307837.0000000000192000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: xFk6x2mrd7.exe PID: 6576JoeSecurity_RedLineYara detected RedLine StealerJoe Security
            Process Memory Space: MSBuild.exe PID: 6812JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.2.xFk6x2mrd7.exe.6cc1e000.5.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                2.2.MSBuild.exe.190000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.xFk6x2mrd7.exe.6cc00000.4.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.2.xFk6x2mrd7.exe.6cc1e000.5.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 94.228.166.68, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 6812, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                      Timestamp:07/01/24-03:11:58.328714
                      SID:2046045
                      Source Port:49731
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/01/24-03:11:58.539624
                      SID:2043234
                      Source Port:80
                      Destination Port:49731
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/01/24-03:12:07.139354
                      SID:2043231
                      Source Port:49731
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: xFk6x2mrd7.exeAvira: detected
                      Source: 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "94.228.166.68:80", "Bot Id": "@MarsSellers12", "Message": "Click Close to exit the program. Error code: 1142", "Authorization Header": "e0c4915670bce95535bec15e4bb6341a"}
                      Source: C:\Users\user\AppData\Roaming\d3d9.dllReversingLabs: Detection: 52%
                      Source: xFk6x2mrd7.exeReversingLabs: Detection: 79%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\d3d9.dllJoe Sandbox ML: detected
                      Source: xFk6x2mrd7.exeJoe Sandbox ML: detected
                      Source: xFk6x2mrd7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: xFk6x2mrd7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599F6D7h2_2_0599EF68
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then inc dword ptr [ebp-20h]2_2_059939C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599DEBAh2_2_0599DA87
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599E33Ah2_2_0599DA87
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then inc dword ptr [ebp-20h]2_2_05993C92
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then inc dword ptr [ebp-20h]2_2_05993CC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599B9E5h2_2_0599B618
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599B9E5h2_2_0599B609
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599A953h2_2_0599A93B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0599D09Dh2_2_0599D07C

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.4:49731 -> 94.228.166.68:80
                      Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.4:49731 -> 94.228.166.68:80
                      Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 94.228.166.68:80 -> 192.168.2.4:49731
                      Source: Malware configuration extractorURLs: 94.228.166.68:80
                      Source: Joe Sandbox ViewASN Name: PRANET-ASRU PRANET-ASRU
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.228.166.68
                      Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002621000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3ResponseD
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                      Source: xFk6x2mrd7.exe, xFk6x2mrd7.exe, 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1778307837.0000000000192000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

                      System Summary

                      barindex
                      Source: xFk6x2mrd7.exeStatic PE information: section name: hTI<GU
                      Source: xFk6x2mrd7.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC02760 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,0_2_6CC02760
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC010900_2_6CC01090
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC02D800_2_6CC02D80
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC027600_2_6CC02760
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC162850_2_6CC16285
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC23B170_2_6CC23B17
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0085DC742_2_0085DC74
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_049B8FF82_2_049B8FF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_049B69482_2_049B6948
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_049B00072_2_049B0007
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_049B00402_2_049B0040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_049B8FE82_2_049B8FE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599E5A82_2_0599E5A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05997DE02_2_05997DE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059975102_2_05997510
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05990F282_2_05990F28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599EF682_2_0599EF68
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05998E402_2_05998E40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599D1302_2_0599D130
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059998E82_2_059998E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599F8E82_2_0599F8E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599B0282_2_0599B028
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599A0502_2_0599A050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599C3D02_2_0599C3D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599DA872_2_0599DA87
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059992A82_2_059992A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599BA692_2_0599BA69
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05990F182_2_05990F18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599B6182_2_0599B618
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599B6092_2_0599B609
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05998E302_2_05998E30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059971C82_2_059971C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599D12F2_2_0599D12F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599F8A12_2_0599F8A1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059998E72_2_059998E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599F8E72_2_0599F8E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599B0272_2_0599B027
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059992982_2_05999298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059AEA182_2_059AEA18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059A18312_2_059A1831
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059A43C02_2_059A43C0
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: String function: 6CC0B810 appears 33 times
                      Source: xFk6x2mrd7.exeBinary or memory string: OriginalFilename vs xFk6x2mrd7.exe
                      Source: xFk6x2mrd7.exe, 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenameSubduer.exe8 vs xFk6x2mrd7.exe
                      Source: xFk6x2mrd7.exe, 00000000.00000000.1649860138.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCosmicEdge1195775391.exeT vs xFk6x2mrd7.exe
                      Source: xFk6x2mrd7.exeBinary or memory string: OriginalFilenameCosmicEdge1195775391.exeT vs xFk6x2mrd7.exe
                      Source: xFk6x2mrd7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: xFk6x2mrd7.exeStatic PE information: Section: hTI<GU ZLIB complexity 1.0003349562198067
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/3@1/1
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6596:120:WilError_03
                      Source: xFk6x2mrd7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: xFk6x2mrd7.exeReversingLabs: Detection: 79%
                      Source: unknownProcess created: C:\Users\user\Desktop\xFk6x2mrd7.exe "C:\Users\user\Desktop\xFk6x2mrd7.exe"
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: xFk6x2mrd7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: xFk6x2mrd7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeUnpacked PE file: 0.2.xFk6x2mrd7.exe.de0000.0.unpack hTI<GU:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                      Source: xFk6x2mrd7.exeStatic PE information: section name: hTI<GU
                      Source: xFk6x2mrd7.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC169B4 push ecx; ret 0_2_6CC169C7
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC23B17 push es; retf 0_2_6CC23B12
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_049BDBF2 push eax; ret 2_2_049BDC01
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059965F5 push cs; ret 2_2_059965FE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05997505 push ss; ret 2_2_0599750E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599555B push ss; ret 2_2_0599557A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059954BB push cs; ret 2_2_059954CA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599575A push ds; ret 2_2_05995762
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599BF7B pushfd ; ret 2_2_0599BF89
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059956DB push ds; ret 2_2_059956EA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059958C0 push es; ret 2_2_059958C6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599B01A push ds; ret 2_2_0599B026
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599AA28 push ds; ret 2_2_0599AA36
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0599C258 push ebx; ret 2_2_0599C272
                      Source: xFk6x2mrd7.exeStatic PE information: section name: hTI<GU entropy: 7.9991516935950715
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 15C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 5750000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 6750000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 6880000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 7880000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 7D60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 8D60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: 9D60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 850000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2500000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2310000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2936Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exe TID: 6744Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4544Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6964Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6892Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: MSBuild.exe, 00000002.00000002.1787447931.0000000005594000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_059945A8 LdrInitializeThunk,2_2_059945A8
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC0B69A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CC0B69A
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC1140B GetProcessHeap,0_2_6CC1140B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC0B1C1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CC0B1C1
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC0B69A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CC0B69A
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC0F637 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CC0F637
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 190000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC02D80 HonorInc,GetConsoleWindow,ShowWindow,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CreateProcessW,WriteProcessMemory,SetThreadContext,CloseHandle,0_2_6CC02D80
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 190000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 190000Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 192000Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 1C0000Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 1DE000Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 343008Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC0B858 cpuid 0_2_6CC0B858
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeQueries volume information: C:\Users\user\Desktop\xFk6x2mrd7.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\xFk6x2mrd7.exeCode function: 0_2_6CC0B2E3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CC0B2E3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.xFk6x2mrd7.exe.6cc1e000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.MSBuild.exe.190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.xFk6x2mrd7.exe.6cc00000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.xFk6x2mrd7.exe.6cc1e000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1778307837.0000000000192000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: xFk6x2mrd7.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6812, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\binance\Jump to behavior
                      Source: Yara matchFile source: 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6812, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.xFk6x2mrd7.exe.6cc1e000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.MSBuild.exe.190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.xFk6x2mrd7.exe.6cc00000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.xFk6x2mrd7.exe.6cc1e000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1778307837.0000000000192000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: xFk6x2mrd7.exe PID: 6576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6812, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      411
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      12
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory341
                      Security Software Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive12
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
                      Process Injection
                      NTDS241
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                      Obfuscated Files or Information
                      Cached Domain Credentials124
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      xFk6x2mrd7.exe79%ReversingLabsWin32.Spyware.RedLine
                      xFk6x2mrd7.exe100%AviraHEUR/AGEN.1311437
                      xFk6x2mrd7.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\d3d9.dll100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\d3d9.dll53%ReversingLabsWin32.Trojan.LummaStealer
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://tempuri.org/0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://api.ip.sb/ip0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                      94.228.166.68:800%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/trust0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id110%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id120%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id16Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id100%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id140%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id130%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id160%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id170%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id190%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA10%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtabS0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id3ResponseD0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id23Response0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ip.sb
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        94.228.166.68:80true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sctMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/chrome_newtabMSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id23ResponseDMSBuild.exe, 00000002.00000002.1781979509.0000000002621000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id12ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id2ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id21ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id9MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id8MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id5MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id4MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id7MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id6MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id19ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/faultMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsatMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id15ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id6ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ip.sb/ipxFk6x2mrd7.exe, xFk6x2mrd7.exe, 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1778307837.0000000000192000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/scMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id1ResponseDMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id9ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id20MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id21MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id22MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id23MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id24MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id24ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ecosia.org/newtab/MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id1ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressingMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trustMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id10MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id11MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id12MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id16ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id13MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id14MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id15MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id16MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/NonceMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id17MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id18MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id5ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id19MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id10ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RenewMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id8ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2006/02/addressingidentityMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/soap/envelope/MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1MSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=MSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002AC3000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002B59000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trustMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/chrome_newtabSMSBuild.exe, 00000002.00000002.1781979509.0000000002B23000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/RollbackMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id3ResponseDMSBuild.exe, 00000002.00000002.1781979509.0000000002621000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id23ResponseMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.1781979509.0000000002501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTMSBuild.exe, 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        94.228.166.68
                        unknownRussian Federation
                        48467PRANET-ASRUtrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1464974
                        Start date and time:2024-07-01 03:11:05 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 6s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:4
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:xFk6x2mrd7.exe
                        renamed because original name is a hash value
                        Original Sample Name:18fd0471029adc5a608cc7c442a97f3a.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@4/3@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 124
                        • Number of non-executed functions: 28
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): SIHClient.exe
                        • Excluded IPs from analysis (whitelisted): 104.26.12.31, 172.67.75.172, 104.26.13.31, 20.114.59.183
                        • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, slscr.update.microsoft.com, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: xFk6x2mrd7.exe
                        TimeTypeDescription
                        21:12:04API Interceptor16x Sleep call for process: MSBuild.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        94.228.166.68qHYHgANDmm.exeGet hashmaliciousRedLine, XmrigBrowse
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          PRANET-ASRUqHYHgANDmm.exeGet hashmaliciousRedLine, XmrigBrowse
                          • 94.228.166.68
                          1Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                          • 94.228.166.74
                          iYhvVk2ZzV.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                          • 94.228.166.75
                          T4LJO0xbse.exeGet hashmaliciousQuasarBrowse
                          • 94.228.166.40
                          K3wj3nqr6c.exeGet hashmaliciousAmadeyBrowse
                          • 94.228.166.74
                          setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                          • 94.228.166.74
                          CS32G1VhXR.exeGet hashmaliciousQuasarBrowse
                          • 94.228.166.40
                          ZXZMRvEA9M.elfGet hashmaliciousMiraiBrowse
                          • 185.46.45.224
                          2mim34IfQZ.exeGet hashmaliciousAsyncRAT, PureLog Stealer, Xmrig, zgRATBrowse
                          • 94.228.162.82
                          qk8WDvZhHH.exeGet hashmaliciousRedLineBrowse
                          • 94.228.162.55
                          No context
                          No context
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):3094
                          Entropy (8bit):5.33145931749415
                          Encrypted:false
                          SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                          MD5:3FD5C0634443FB2EF2796B9636159CB6
                          SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                          SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                          SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          Process:C:\Users\user\Desktop\xFk6x2mrd7.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):42
                          Entropy (8bit):4.0050635535766075
                          Encrypted:false
                          SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                          MD5:84CFDB4B995B1DBF543B26B86C863ADC
                          SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                          SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                          SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                          Process:C:\Users\user\Desktop\xFk6x2mrd7.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):429568
                          Entropy (8bit):5.884262476306309
                          Encrypted:false
                          SSDEEP:6144:tfbuDSGUgh8uvy6fyMIHBsxu5wmS3UE9OgiPProBNmu:tgUgtv+Bsxu5o3NIgiPEXx
                          MD5:BE83077ACEA269C2187E97BB1B69105D
                          SHA1:987759A7153784121F4EF96CF4D78D1E9C552FC3
                          SHA-256:4045CE5F58A63DD9CF525424F950F8D6EA8BE2D0B93069B691077480787FFA78
                          SHA-512:E9F6DA69AF0730912586D4A8D388069872F1ED27E2E1B0C54570ADD6DED52F5E0E1DA268E55615CD82076FA2FB1DD559CCA7BDA23E45FA2CC5C08E1CFA8C6E94
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 53%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.)...GQ..GQ..GQL.DP..GQL.BP..GQL.CP..GQL.FP..GQ z<Q..GQ..FQe.GQ.=BP..GQ.=CP..GQ.=DP..GQ..GQ..GQj=GP..GQj=EP..GQRich..GQ........................PE..L...$K}f...........!...&.^...6...............p............................................@.............................x...x...<................................... ...............................`...@............p..P............................text....\.......^.................. ..`.rdata...d...p...f...b..............@..@.data...L...........................@....reloc...............z..............@..B................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.166616929707346
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          • Win32 Executable (generic) a (10002005/4) 49.96%
                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:xFk6x2mrd7.exe
                          File size:364'032 bytes
                          MD5:18fd0471029adc5a608cc7c442a97f3a
                          SHA1:74854bda1aa3e60c3b6f58e8f77882ac7f958486
                          SHA256:1e92e176dd94bb165b9ac9a391ed84ad473ae69a44139d2f9765dd56974cee0d
                          SHA512:9cc462178cf8b63b27de90998c3a8cc722cec0bbde604e66482510c3888a78b1e869b4d3e7195c3361bb7fce43392c204c5b760948afd3bbddd6ee225bb61e00
                          SSDEEP:6144:MM/FgKFH4ZtKyKtHFrO/ODMruf29AYlxJzZfPkcdeyO9U/PRdygA/g3/FGXIqNPo:MI/FutKyQli/3rtT5zPdeyO9U/PRdygE
                          TLSH:847472DDB66076DFC867D462DEA82CA4EA6035BB832F4203912715EDDA4C897DF140F2
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%K}f.................D...F...........`... ....@.. ....................... ............@................................
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x46000a
                          Entrypoint Section:
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x667D4B25 [Thu Jun 27 11:21:09 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00460000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x367f00x4b.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x708.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x600000x8
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x360000x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          hTI<GU0x20000x33ad00x33c009eb466f3bf5b4114a35e46a20c167eddFalse1.0003349562198067data7.9991516935950715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .text0x360000x241300x2420090234ef2e5cd346249b89beaf6466665False0.3637745999134948data4.658950186278248IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x5c0000x7080x8001d787ed6c4b97baca56d3ff56006a715False0.37158203125data3.7983394671855426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x5e0000xc0x2001e37c0bd08615c8250069f61ab34fa51False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          0x600000x100x2005171f734e1ace2a5e021287851456a44False0.044921875data0.12227588125913882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0x5c0a00x478data0.4012237762237762
                          RT_MANIFEST0x5c5180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          07/01/24-03:11:58.328714TCP2046045ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)4973180192.168.2.494.228.166.68
                          07/01/24-03:11:58.539624TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response804973194.228.166.68192.168.2.4
                          07/01/24-03:12:07.139354TCP2043231ET TROJAN Redline Stealer TCP CnC Activity4973180192.168.2.494.228.166.68
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 1, 2024 03:11:50.325644970 CEST49675443192.168.2.4173.222.162.32
                          Jul 1, 2024 03:11:57.432231903 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:11:57.442897081 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:11:57.442986965 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:11:57.467086077 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:11:57.472150087 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:11:58.298468113 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:11:58.328713894 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:11:58.334120035 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:11:58.539623976 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:11:58.591370106 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:11:59.935131073 CEST49675443192.168.2.4173.222.162.32
                          Jul 1, 2024 03:12:03.579365015 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:03.584655046 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798269987 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798331022 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798368931 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798403978 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798404932 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:03.798441887 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798477888 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.798491955 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:03.798568010 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:03.892632008 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:03.935038090 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.254082918 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.259042978 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259057999 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259073019 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259079933 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259087086 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259114027 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.259135008 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.259151936 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259160042 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259172916 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.259182930 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259191990 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259202957 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.259206057 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.259258032 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.263915062 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.263933897 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.263978958 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.263986111 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.263993979 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.263997078 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264050007 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264055967 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264147043 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264194965 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264236927 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264307022 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.264420986 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.268491030 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273493052 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273554087 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273577929 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273610115 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273662090 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273689032 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273716927 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273741007 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273761988 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273766994 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273804903 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273813009 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273857117 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273859978 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273899078 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273906946 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273906946 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273967028 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.273973942 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.273982048 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274009943 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274019003 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274071932 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274072886 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274080992 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274121046 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274148941 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274157047 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274174929 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274202108 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274223089 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274259090 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274264097 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274271965 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274312973 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274358988 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274373055 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274411917 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274415970 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274455070 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.274456978 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.274506092 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278378963 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278425932 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278434038 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278440952 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278449059 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278466940 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278484106 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278491020 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278501987 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278505087 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278523922 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278554916 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278558016 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278563023 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278570890 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278604031 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278613091 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.278614998 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278628111 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278635025 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278662920 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278671026 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278755903 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278764009 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278784990 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278791904 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278850079 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278856993 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278870106 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278877974 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278915882 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278923035 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278969049 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.278976917 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279037952 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279046059 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279052973 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279061079 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279088974 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279165983 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279174089 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279181004 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279189110 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279223919 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279232025 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279272079 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279278994 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279290915 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279299974 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279313087 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279371023 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.279378891 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279422998 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279431105 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279443979 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.279450893 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279459000 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279489994 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279496908 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279532909 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.279541016 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283137083 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283144951 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283209085 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283216953 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283252001 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283258915 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283358097 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283366919 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283373117 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283380032 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283392906 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283401012 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283413887 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283421040 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283463955 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283473015 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283535004 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283543110 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283672094 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283679008 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283682108 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283685923 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283693075 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283699989 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283781052 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283788919 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283796072 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283802986 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283816099 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283823013 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283862114 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283869028 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283876896 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283906937 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283962011 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283968925 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.283976078 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284143925 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.284207106 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.284286022 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284293890 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284315109 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284322023 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284343958 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284370899 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284378052 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284415960 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284451008 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284459114 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284467936 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284533978 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284542084 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284559965 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284567118 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284595966 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284603119 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284666061 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284673929 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284682035 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284696102 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284703970 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284734011 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284742117 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284785032 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284792900 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284800053 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284813881 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284822941 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284828901 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284836054 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284856081 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284863949 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284885883 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.284894943 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285248995 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285257101 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285264015 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285270929 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285276890 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285286903 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285294056 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285300970 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285307884 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285315037 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285321951 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285329103 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.285336018 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.287940979 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.287981987 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.287988901 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.288218975 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.288227081 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289316893 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289324045 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289395094 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289403915 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289489985 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289496899 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.289506912 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289557934 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.289558887 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289566994 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289697886 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289731026 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289763927 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289771080 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289911985 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289920092 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289938927 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289982080 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289989948 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.289998055 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290045023 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290051937 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290064096 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290071964 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290096998 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290194035 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290200949 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290209055 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290230036 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290236950 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290271044 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290330887 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290338993 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290345907 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290370941 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290378094 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290390968 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290399075 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290436983 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290445089 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290474892 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290482044 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290504932 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290513039 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290527105 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290596962 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290604115 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290611029 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290616989 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290633917 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290642023 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.290647984 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.291135073 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.291142941 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.291150093 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295583963 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295651913 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295660019 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295663118 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295666933 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295698881 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295770884 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.295819998 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295829058 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295838118 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295838118 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.295881033 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295891047 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295897961 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295907021 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295934916 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295943022 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295973063 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295980930 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.295984030 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296021938 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296030998 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296123981 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296130896 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296139002 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296145916 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296153069 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296155930 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296226978 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296235085 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296241045 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296247959 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296255112 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296262026 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296268940 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296276093 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296355963 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296365023 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296371937 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296377897 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296385050 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296391964 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296520948 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296528101 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296535969 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296541929 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296549082 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296555996 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296622038 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296631098 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296633959 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296639919 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296643019 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296650887 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.296755075 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302541971 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302560091 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302567005 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302576065 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302608013 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302615881 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302656889 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302664995 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302697897 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302706003 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302714109 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.302736998 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302746058 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302772999 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.302773952 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302809954 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302817106 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302819967 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302844048 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302850962 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302918911 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302927017 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302944899 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.302994013 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303083897 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303091049 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303097963 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303105116 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303112984 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303272963 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303333044 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303340912 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303349018 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303390980 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303397894 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303507090 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303514957 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303524017 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303531885 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303539038 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303545952 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303553104 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303620100 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303627968 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303634882 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303641081 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303648949 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303656101 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303663015 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303669930 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303710938 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303719044 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303725004 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303731918 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.303739071 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310240984 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310254097 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310270071 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310277939 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310285091 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310292959 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310302973 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310344934 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310353041 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310357094 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310384989 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310415983 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.310435057 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310445070 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310448885 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310478926 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.310501099 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310508966 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310523033 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310529947 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310590982 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310599089 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310651064 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310658932 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310699940 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.310707092 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311275959 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311284065 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311316967 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311376095 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311383963 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311388016 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311451912 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311460018 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311465979 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311480999 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.311489105 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.356884003 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.356900930 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.357223034 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.357305050 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.357305050 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.357362032 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.361762047 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362158060 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362185001 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362231016 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362257957 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362284899 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362312078 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362360954 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362386942 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362412930 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362440109 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362489939 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362515926 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362543106 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362569094 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362595081 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362653017 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362679005 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362705946 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362735987 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362762928 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362875938 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362904072 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362931013 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.362978935 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363004923 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363032103 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363059044 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363085985 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363114119 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363140106 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363166094 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363192081 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.363218069 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.388139963 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.393495083 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.393665075 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.398561954 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398614883 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398643017 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398694038 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398722887 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398747921 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398775101 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398822069 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398849010 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398878098 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398905039 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398932934 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398958921 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.398987055 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.399013042 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:06.435015917 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:06.440149069 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:07.138489008 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:07.139353991 CEST4973180192.168.2.494.228.166.68
                          Jul 1, 2024 03:12:07.144371986 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:07.456034899 CEST804973194.228.166.68192.168.2.4
                          Jul 1, 2024 03:12:07.484842062 CEST4973180192.168.2.494.228.166.68
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 1, 2024 03:12:04.121299982 CEST5986153192.168.2.41.1.1.1
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 1, 2024 03:12:04.121299982 CEST192.168.2.41.1.1.10x8caStandard query (0)api.ip.sbA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 1, 2024 03:12:04.128079891 CEST1.1.1.1192.168.2.40x8caNo error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.44973194.228.166.68806812C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          TimestampBytes transferredDirectionData
                          Jul 1, 2024 03:11:57.467086077 CEST37OUTData Raw: 00 01 00 01 02 02 1b 6e 65 74 2e 74 63 70 3a 2f 2f 39 34 2e 32 32 38 2e 31 36 36 2e 36 38 3a 38 30 2f 03 08 0c
                          Data Ascii: net.tcp://94.228.166.68:80/
                          Jul 1, 2024 03:11:58.298468113 CEST1INData Raw: 0b
                          Data Ascii:
                          Jul 1, 2024 03:11:58.328713894 CEST202OUTData Raw: 06 c7 01 52 1d 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 45 6e 74 69 74 79 2f 49 64 31 1b 6e 65 74 2e 74 63 70 3a 2f 2f 39 34 2e 32 32 38 2e 31 36 36 2e 36 38 3a 38 30 2f 03 49 64 31 13 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e
                          Data Ascii: Rhttp://tempuri.org/Entity/Id1net.tcp://94.228.166.68:80/Id1http://tempuri.org/VsaVD@Authorizationns1 e0c4915670bce95535bec15e4bb6341aDGWcDxJ_DK]D,D*DVB
                          Jul 1, 2024 03:11:58.539623976 CEST142INData Raw: 06 8b 01 50 25 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 45 6e 74 69 74 79 2f 49 64 31 52 65 73 70 6f 6e 73 65 0b 49 64 31 52 65 73 70 6f 6e 73 65 13 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 09 49 64 31 52 65 73 75
                          Data Ascii: P%http://tempuri.org/Entity/Id1ResponseId1Responsehttp://tempuri.org/Id1ResultVsaVDDGWcDxJ_DK]DVBB
                          Jul 1, 2024 03:12:03.579365015 CEST154OUTData Raw: 06 97 01 22 1d 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 45 6e 74 69 74 79 2f 49 64 32 03 49 64 32 56 02 0b 01 73 04 0b 01 61 06 56 08 44 0a 1e 00 82 ab 09 40 0d 41 75 74 68 6f 72 69 7a 61 74 69 6f 6e 08 03 6e 73 31 99 20 65 30 63
                          Data Ascii: "http://tempuri.org/Entity/Id2Id2VsaVD@Authorizationns1 e0c4915670bce95535bec15e4bb6341aD4FRO8:D,D*DVB
                          Jul 1, 2024 03:12:03.798269987 CEST1236INData Raw: 06 ff 33 f8 01 25 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 45 6e 74 69 74 79 2f 49 64 32 52 65 73 70 6f 6e 73 65 0b 49 64 32 52 65 73 70 6f 6e 73 65 09 49 64 32 52 65 73 75 6c 74 06 45 6e 74 69 74 79 29 68 74 74 70 3a 2f 2f 77 77
                          Data Ascii: 3%http://tempuri.org/Entity/Id2ResponseId2ResponseId2ResultEntity)http://www.w3.org/2001/XMLSchema-instanceId1Id109http://schemas.microsoft.com/2003/10/Serialization/ArraysstringId11Id12Id13Entity17Id2Id3Entity16Id4Id5Id6I
                          Jul 1, 2024 03:12:03.798331022 CEST1236INData Raw: 46 19 99 2d 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 49 72 69 64 69 75 6d 5c 55 73 65 72 20 44 61 74 61 46 19 99 31 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 37
                          Data Ascii: F-%USERPROFILE%\AppData\Local\Iridium\User DataF1%USERPROFILE%\AppData\Local\7Star\7Star\User DataF1%USERPROFILE%\AppData\Local\CentBrowser\User DataF,%USERPROFILE%\AppData\Local\Chedot\User DataF-%USERPROFILE%\AppData\Local\Vivaldi\
                          Jul 1, 2024 03:12:03.798368931 CEST448INData Raw: 5c 55 73 65 72 20 44 61 74 61 46 19 99 35 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 53 70 75 74 6e 69 6b 5c 53 70 75 74 6e 69 6b 5c 55 73 65 72 20 44 61 74 61 46 19 99 2e 25 55 53 45 52 50 52 4f 46 49 4c
                          Data Ascii: \User DataF5%USERPROFILE%\AppData\Local\Sputnik\Sputnik\User DataF.%USERPROFILE%\AppData\Local\Nichrome\User DataF4%USERPROFILE%\AppData\Local\CocCoc\Browser\User DataF*%USERPROFILE%\AppData\Local\Uran\User DataF.%USERPROFILE%\AppDat
                          Jul 1, 2024 03:12:03.798403978 CEST1236INData Raw: 46 19 99 48 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 4e 56 49 44 49 41 20 43 6f 72 70 6f 72 61 74 69 6f 6e 5c 4e 56 49 44 49 41 20 47 65 46 6f 72 63 65 20 45 78 70 65 72 69 65 6e 63 65 46 19 99 21 25 55
                          Data Ascii: FH%USERPROFILE%\AppData\Local\NVIDIA Corporation\NVIDIA GeForce ExperienceF!%USERPROFILE%\AppData\Local\SteamF-%USERPROFILE%\AppData\Local\CryptoTab BrowserF2%USERPROFILE%\AppData\Local\MapleStudio\ChromePlusF)%USERPROFILE%\AppData\L
                          Jul 1, 2024 03:12:03.798441887 CEST1236INData Raw: 44 61 74 61 5c 4c 6f 63 61 6c 5c 42 72 61 76 65 53 6f 66 74 77 61 72 65 5c 42 72 61 76 65 2d 42 72 6f 77 73 65 72 2d 4e 69 67 68 74 6c 79 5c 55 73 65 72 20 44 61 74 61 46 19 99 2c 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c
                          Data Ascii: Data\Local\BraveSoftware\Brave-Browser-Nightly\User DataF,%USERPROFILE%\AppData\Roaming\Lulumi-browserF+%USERPROFILE%\AppData\Local\Xvast\User DataF,%USERPROFILE%\AppData\Roaming\kingpinbrowserF7%USERPROFILE%\AppData\Local\Tencent\QQBr


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:21:11:53
                          Start date:30/06/2024
                          Path:C:\Users\user\Desktop\xFk6x2mrd7.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\xFk6x2mrd7.exe"
                          Imagebase:0xde0000
                          File size:364'032 bytes
                          MD5 hash:18FD0471029ADC5A608CC7C442A97F3A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:21:11:53
                          Start date:30/06/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:21:11:53
                          Start date:30/06/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          Imagebase:0x90000
                          File size:262'432 bytes
                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.1778307837.0000000000192000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1781979509.0000000002595000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:18.3%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:3.5%
                            Total number of Nodes:1865
                            Total number of Limit Nodes:10
                            execution_graph 9725 6cc0d041 9726 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9725->9726 9727 6cc0d049 9726->9727 9728 6cc0d069 9727->9728 9736 6cc0cfb1 9727->9736 9740 6cc0ca8f RtlUnwind 9728->9740 9731 6cc0d07e 9732 6cc0da6a __FrameHandler3::FrameUnwindToState 49 API calls 9731->9732 9733 6cc0d08f __FrameHandler3::FrameUnwindToState 9732->9733 9741 6cc0d7fa 9733->9741 9735 6cc0d0b7 __InternalCxxFrameHandler 9737 6cc0cfbd __FrameHandler3::FrameUnwindToState 9736->9737 9738 6cc0ce73 __InternalCxxFrameHandler 39 API calls 9737->9738 9739 6cc0cfe5 __InternalCxxFrameHandler ___AdjustPointer 9738->9739 9739->9728 9740->9731 9742 6cc0d806 __FrameHandler3::FrameUnwindToState 9741->9742 9755 6cc0cb13 9742->9755 9745 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9746 6cc0d832 9745->9746 9747 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9746->9747 9748 6cc0d83d 9747->9748 9749 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9748->9749 9750 6cc0d848 9749->9750 9751 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9750->9751 9752 6cc0d850 __InternalCxxFrameHandler 9751->9752 9753 6cc0d94d __InternalCxxFrameHandler 50 API calls 9752->9753 9754 6cc0d935 9753->9754 9754->9735 9756 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9755->9756 9757 6cc0cb24 9756->9757 9758 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9757->9758 9759 6cc0cb2f 9758->9759 9759->9745 9760 6cc0ea42 9763 6cc0eac8 9760->9763 9764 6cc0ea55 9763->9764 9765 6cc0eadc 9763->9765 9765->9764 9766 6cc0f984 __freea 14 API calls 9765->9766 9766->9764 9260 6cc157c5 9262 6cc157ed 9260->9262 9261 6cc15825 9262->9261 9263 6cc15817 9262->9263 9264 6cc1581e 9262->9264 9269 6cc15897 9263->9269 9273 6cc15880 9264->9273 9270 6cc158a0 9269->9270 9277 6cc15dbc 9270->9277 9274 6cc158a0 9273->9274 9275 6cc15dbc __startOneArgErrorHandling 20 API calls 9274->9275 9276 6cc15823 9275->9276 9278 6cc15dfb __startOneArgErrorHandling 9277->9278 9280 6cc15e83 __startOneArgErrorHandling 9278->9280 9285 6cc16262 9278->9285 9282 6cc15eb8 9280->9282 9288 6cc16576 9280->9288 9283 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9282->9283 9284 6cc1581c 9283->9284 9295 6cc16285 9285->9295 9289 6cc1659a 9288->9289 9290 6cc16583 9288->9290 9291 6cc0f914 __dosmaperr 14 API calls 9289->9291 9292 6cc1659f 9290->9292 9293 6cc0f914 __dosmaperr 14 API calls 9290->9293 9291->9292 9292->9282 9294 6cc16592 9293->9294 9294->9282 9296 6cc162b0 __raise_exc 9295->9296 9297 6cc164a9 RaiseException 9296->9297 9298 6cc16280 9297->9298 9298->9280 9299 6cc15ac7 9300 6cc15ae0 __startOneArgErrorHandling 9299->9300 9302 6cc15b31 __startOneArgErrorHandling 9300->9302 9303 6cc15f14 9300->9303 9304 6cc15f4d __startOneArgErrorHandling 9303->9304 9305 6cc16285 __raise_exc RaiseException 9304->9305 9306 6cc15f74 __startOneArgErrorHandling 9304->9306 9305->9306 9307 6cc15fb7 9306->9307 9308 6cc15f92 9306->9308 9309 6cc16576 __startOneArgErrorHandling 14 API calls 9307->9309 9314 6cc165a7 9308->9314 9311 6cc15fb2 __startOneArgErrorHandling 9309->9311 9312 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9311->9312 9313 6cc15fdb 9312->9313 9313->9302 9315 6cc165b4 9314->9315 9316 6cc165c3 __startOneArgErrorHandling 9315->9316 9318 6cc165f2 __startOneArgErrorHandling 9315->9318 9317 6cc16576 __startOneArgErrorHandling 14 API calls 9316->9317 9319 6cc165dc 9317->9319 9320 6cc16640 9318->9320 9321 6cc16576 __startOneArgErrorHandling 14 API calls 9318->9321 9319->9311 9320->9311 9321->9320 9767 6cc0e647 9782 6cc10988 9767->9782 9772 6cc0e663 9774 6cc0f984 __freea 14 API calls 9772->9774 9773 6cc0e66f 9809 6cc0e6a0 9773->9809 9776 6cc0e669 9774->9776 9778 6cc0f984 __freea 14 API calls 9779 6cc0e693 9778->9779 9780 6cc0f984 __freea 14 API calls 9779->9780 9781 6cc0e699 9780->9781 9783 6cc10991 9782->9783 9787 6cc0e658 9782->9787 9784 6cc0f2f2 39 API calls 9783->9784 9785 6cc109b4 9784->9785 9786 6cc10793 49 API calls 9785->9786 9786->9787 9788 6cc10edf GetEnvironmentStringsW 9787->9788 9789 6cc10ef7 9788->9789 9790 6cc0e65d 9788->9790 9791 6cc10e3c ___scrt_uninitialize_crt WideCharToMultiByte 9789->9791 9790->9772 9790->9773 9792 6cc10f14 9791->9792 9793 6cc10f29 9792->9793 9794 6cc10f1e FreeEnvironmentStringsW 9792->9794 9795 6cc11e9a 15 API calls 9793->9795 9794->9790 9796 6cc10f30 9795->9796 9797 6cc10f49 9796->9797 9798 6cc10f38 9796->9798 9799 6cc10e3c ___scrt_uninitialize_crt WideCharToMultiByte 9797->9799 9800 6cc0f984 __freea 14 API calls 9798->9800 9801 6cc10f59 9799->9801 9802 6cc10f3d FreeEnvironmentStringsW 9800->9802 9803 6cc10f60 9801->9803 9804 6cc10f68 9801->9804 9802->9790 9805 6cc0f984 __freea 14 API calls 9803->9805 9806 6cc0f984 __freea 14 API calls 9804->9806 9807 6cc10f66 FreeEnvironmentStringsW 9805->9807 9806->9807 9807->9790 9810 6cc0e6b5 9809->9810 9811 6cc0f927 _unexpected 14 API calls 9810->9811 9812 6cc0e6dc 9811->9812 9813 6cc0e6e4 9812->9813 9818 6cc0e6ee 9812->9818 9814 6cc0f984 __freea 14 API calls 9813->9814 9815 6cc0e676 9814->9815 9815->9778 9816 6cc0e74b 9817 6cc0f984 __freea 14 API calls 9816->9817 9817->9815 9818->9816 9818->9818 9819 6cc0f927 _unexpected 14 API calls 9818->9819 9820 6cc0e75a 9818->9820 9825 6cc0e775 9818->9825 9827 6cc0f984 __freea 14 API calls 9818->9827 9831 6cc0ebbf 9818->9831 9819->9818 9840 6cc0e782 9820->9840 9824 6cc0f984 __freea 14 API calls 9826 6cc0e767 9824->9826 9828 6cc0f843 ___std_exception_copy 11 API calls 9825->9828 9829 6cc0f984 __freea 14 API calls 9826->9829 9827->9818 9830 6cc0e781 9828->9830 9829->9815 9832 6cc0ebcd 9831->9832 9833 6cc0ebdb 9831->9833 9832->9833 9838 6cc0ebf3 9832->9838 9834 6cc0f914 __dosmaperr 14 API calls 9833->9834 9835 6cc0ebe3 9834->9835 9836 6cc0f833 ___std_exception_copy 29 API calls 9835->9836 9837 6cc0ebed 9836->9837 9837->9818 9838->9837 9839 6cc0f914 __dosmaperr 14 API calls 9838->9839 9839->9835 9841 6cc0e78f 9840->9841 9845 6cc0e760 9840->9845 9842 6cc0e7a6 9841->9842 9843 6cc0f984 __freea 14 API calls 9841->9843 9844 6cc0f984 __freea 14 API calls 9842->9844 9843->9841 9844->9845 9845->9824 9322 6cc0d7cd 9325 6cc0dd27 9322->9325 9324 6cc0d7e2 9326 6cc0dd34 9325->9326 9327 6cc0dd3b 9325->9327 9328 6cc0eb99 ___std_exception_destroy 14 API calls 9326->9328 9327->9324 9328->9327 9849 6cc0fb4e 9852 6cc0f9d6 9849->9852 9853 6cc0f9e4 9852->9853 9854 6cc0f9fe 9852->9854 9857 6cc10128 14 API calls 9853->9857 9855 6cc0fa24 9854->9855 9856 6cc0fa05 9854->9856 9859 6cc10d82 ___scrt_uninitialize_crt MultiByteToWideChar 9855->9859 9858 6cc0f9ee 9856->9858 9870 6cc1017e 9856->9870 9857->9858 9861 6cc0fa33 9859->9861 9862 6cc0fa3a GetLastError 9861->9862 9864 6cc1017e 15 API calls 9861->9864 9867 6cc0fa60 9861->9867 9863 6cc0f8ba __dosmaperr 14 API calls 9862->9863 9866 6cc0fa46 9863->9866 9864->9867 9865 6cc10d82 ___scrt_uninitialize_crt MultiByteToWideChar 9868 6cc0fa77 9865->9868 9869 6cc0f914 __dosmaperr 14 API calls 9866->9869 9867->9858 9867->9865 9868->9858 9868->9862 9869->9858 9871 6cc10128 14 API calls 9870->9871 9872 6cc1018c 9871->9872 9873 6cc101bd 15 API calls 9872->9873 9874 6cc1019d 9873->9874 9874->9858 9329 6cc10cd1 GetCommandLineA GetCommandLineW 9330 6cc0c5d0 9331 6cc0c5e2 9330->9331 9333 6cc0c5f0 9330->9333 9332 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9331->9332 9332->9333 9875 6cc0e152 9876 6cc0eb5d _unexpected 39 API calls 9875->9876 9877 6cc0e15a 9876->9877 9334 6cc113d5 9335 6cc11406 9334->9335 9337 6cc113e0 9334->9337 9336 6cc113f0 FreeLibrary 9336->9337 9337->9335 9337->9336 9878 6cc0fd54 9885 6cc101dc 9878->9885 9881 6cc0fd6e 9883 6cc0f984 __freea 14 API calls 9881->9883 9882 6cc0f984 __freea 14 API calls 9882->9881 9884 6cc0fd10 9883->9884 9886 6cc101ee 9885->9886 9895 6cc0fd5f 9885->9895 9887 6cc101f3 9886->9887 9888 6cc10219 9886->9888 9889 6cc0f927 _unexpected 14 API calls 9887->9889 9888->9895 9896 6cc10f7f 9888->9896 9890 6cc101fc 9889->9890 9892 6cc0f984 __freea 14 API calls 9890->9892 9892->9895 9893 6cc10239 9894 6cc0f984 __freea 14 API calls 9893->9894 9894->9895 9895->9881 9895->9882 9897 6cc10fa7 9896->9897 9898 6cc10f8c 9896->9898 9900 6cc10fb6 9897->9900 9905 6cc12f3c 9897->9905 9898->9897 9899 6cc10f98 9898->9899 9901 6cc0f914 __dosmaperr 14 API calls 9899->9901 9912 6cc12f6f 9900->9912 9904 6cc10f9d __FrameHandler3::FrameUnwindToState 9901->9904 9904->9893 9906 6cc12f47 9905->9906 9907 6cc12f5c HeapSize 9905->9907 9908 6cc0f914 __dosmaperr 14 API calls 9906->9908 9907->9900 9909 6cc12f4c 9908->9909 9910 6cc0f833 ___std_exception_copy 29 API calls 9909->9910 9911 6cc12f57 9910->9911 9911->9900 9913 6cc12f87 9912->9913 9914 6cc12f7c 9912->9914 9915 6cc12f8f 9913->9915 9922 6cc12f98 _unexpected 9913->9922 9916 6cc11e9a 15 API calls 9914->9916 9917 6cc0f984 __freea 14 API calls 9915->9917 9920 6cc12f84 9916->9920 9917->9920 9918 6cc12fc2 HeapReAlloc 9918->9920 9918->9922 9919 6cc12f9d 9921 6cc0f914 __dosmaperr 14 API calls 9919->9921 9920->9904 9921->9920 9922->9918 9922->9919 9923 6cc116c0 _unexpected 2 API calls 9922->9923 9923->9922 9338 6cc16bd9 9339 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9338->9339 9340 6cc16bef 9339->9340 9341 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9340->9341 9342 6cc16bf9 9341->9342 9928 6cc0ea59 9929 6cc0f984 __freea 14 API calls 9928->9929 9930 6cc0ea67 9929->9930 9931 6cc0f984 __freea 14 API calls 9930->9931 9932 6cc0ea7a 9931->9932 9933 6cc0f984 __freea 14 API calls 9932->9933 9934 6cc0ea8b 9933->9934 9935 6cc0f984 __freea 14 API calls 9934->9935 9936 6cc0ea9c 9935->9936 9347 6cc14fda IsProcessorFeaturePresent 9348 6cc0f4dc 9356 6cc111e9 9348->9356 9351 6cc0f4f0 9352 6cc0f388 __dosmaperr 14 API calls 9353 6cc0f4f8 9352->9353 9354 6cc0f505 9353->9354 9355 6cc0f508 __DllMainCRTStartup@12 6 API calls 9353->9355 9355->9351 9357 6cc11105 _unexpected 5 API calls 9356->9357 9358 6cc11205 9357->9358 9359 6cc1121d TlsAlloc 9358->9359 9360 6cc0f4e6 9358->9360 9359->9360 9360->9351 9360->9352 9036 6cc0ae5e 9037 6cc0ae69 9036->9037 9038 6cc0ae9c 9036->9038 9040 6cc0ae8e 9037->9040 9041 6cc0ae6e 9037->9041 9039 6cc0afb8 __DllMainCRTStartup@12 86 API calls 9038->9039 9047 6cc0ae78 9039->9047 9048 6cc0aeb1 9040->9048 9043 6cc0ae84 9041->9043 9045 6cc0ae73 9041->9045 9067 6cc0b46b 9043->9067 9045->9047 9062 6cc0b48a 9045->9062 9049 6cc0aebd __FrameHandler3::FrameUnwindToState 9048->9049 9075 6cc0b4fb 9049->9075 9051 6cc0aec4 __DllMainCRTStartup@12 9052 6cc0afb0 9051->9052 9053 6cc0aeeb 9051->9053 9059 6cc0af27 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 9051->9059 9055 6cc0b69a __DllMainCRTStartup@12 4 API calls 9052->9055 9086 6cc0b45d 9053->9086 9056 6cc0afb7 9055->9056 9057 6cc0aefa __RTC_Initialize 9057->9059 9089 6cc0b37b InitializeSListHead 9057->9089 9059->9047 9060 6cc0af08 9060->9059 9090 6cc0b432 9060->9090 9151 6cc0eb13 9062->9151 9240 6cc0c34c 9067->9240 9070 6cc0b474 9070->9047 9073 6cc0b487 9073->9047 9074 6cc0c357 21 API calls 9074->9070 9076 6cc0b504 9075->9076 9094 6cc0b858 IsProcessorFeaturePresent 9076->9094 9080 6cc0b515 9085 6cc0b519 9080->9085 9104 6cc0eaf6 9080->9104 9082 6cc0b530 9082->9051 9084 6cc0c35f ___scrt_uninitialize_crt 7 API calls 9084->9085 9085->9051 9145 6cc0b534 9086->9145 9088 6cc0b464 9088->9057 9089->9060 9091 6cc0b437 ___scrt_release_startup_lock 9090->9091 9092 6cc0b858 IsProcessorFeaturePresent 9091->9092 9093 6cc0b440 9091->9093 9092->9093 9093->9059 9095 6cc0b510 9094->9095 9096 6cc0c32d 9095->9096 9107 6cc0c7fc 9096->9107 9099 6cc0c336 9099->9080 9101 6cc0c33e 9102 6cc0c349 9101->9102 9103 6cc0c838 ___vcrt_uninitialize_locks DeleteCriticalSection 9101->9103 9102->9080 9103->9099 9136 6cc11618 9104->9136 9108 6cc0c805 9107->9108 9110 6cc0c82e 9108->9110 9111 6cc0c332 9108->9111 9121 6cc0ce2c 9108->9121 9112 6cc0c838 ___vcrt_uninitialize_locks DeleteCriticalSection 9110->9112 9111->9099 9113 6cc0c7ae 9111->9113 9112->9111 9126 6cc0cd3d 9113->9126 9116 6cc0c7c3 9116->9101 9119 6cc0c7de 9119->9101 9120 6cc0c7e1 ___vcrt_uninitialize_ptd 6 API calls 9120->9116 9122 6cc0cc52 ___vcrt_FlsFree 5 API calls 9121->9122 9123 6cc0ce46 9122->9123 9124 6cc0ce64 InitializeCriticalSectionAndSpinCount 9123->9124 9125 6cc0ce4f 9123->9125 9124->9125 9125->9108 9127 6cc0cc52 ___vcrt_FlsFree 5 API calls 9126->9127 9128 6cc0cd57 9127->9128 9129 6cc0cd70 TlsAlloc 9128->9129 9130 6cc0c7b8 9128->9130 9130->9116 9131 6cc0cdee 9130->9131 9132 6cc0cc52 ___vcrt_FlsFree 5 API calls 9131->9132 9133 6cc0ce08 9132->9133 9134 6cc0ce23 TlsSetValue 9133->9134 9135 6cc0c7d1 9133->9135 9134->9135 9135->9119 9135->9120 9137 6cc11628 9136->9137 9138 6cc0b522 9136->9138 9137->9138 9140 6cc114dc 9137->9140 9138->9082 9138->9084 9141 6cc114e3 9140->9141 9142 6cc11526 GetStdHandle 9141->9142 9143 6cc11588 9141->9143 9144 6cc11539 GetFileType 9141->9144 9142->9141 9143->9137 9144->9141 9146 6cc0b540 9145->9146 9147 6cc0b544 9145->9147 9146->9088 9148 6cc0b69a __DllMainCRTStartup@12 4 API calls 9147->9148 9150 6cc0b551 ___scrt_release_startup_lock 9147->9150 9149 6cc0b5ba 9148->9149 9150->9088 9157 6cc0f20b 9151->9157 9154 6cc0c357 9223 6cc0c6e3 9154->9223 9158 6cc0f215 9157->9158 9161 6cc0b48f 9157->9161 9159 6cc11267 _unexpected 6 API calls 9158->9159 9160 6cc0f21c 9159->9160 9160->9161 9162 6cc112a6 _unexpected 6 API calls 9160->9162 9161->9154 9163 6cc0f22f 9162->9163 9165 6cc0f0d2 9163->9165 9166 6cc0f0dd 9165->9166 9167 6cc0f0ed 9165->9167 9171 6cc0f0f3 9166->9171 9167->9161 9170 6cc0f984 __freea 14 API calls 9170->9167 9172 6cc0f10e 9171->9172 9173 6cc0f108 9171->9173 9175 6cc0f984 __freea 14 API calls 9172->9175 9174 6cc0f984 __freea 14 API calls 9173->9174 9174->9172 9176 6cc0f11a 9175->9176 9177 6cc0f984 __freea 14 API calls 9176->9177 9178 6cc0f125 9177->9178 9179 6cc0f984 __freea 14 API calls 9178->9179 9180 6cc0f130 9179->9180 9181 6cc0f984 __freea 14 API calls 9180->9181 9182 6cc0f13b 9181->9182 9183 6cc0f984 __freea 14 API calls 9182->9183 9184 6cc0f146 9183->9184 9185 6cc0f984 __freea 14 API calls 9184->9185 9186 6cc0f151 9185->9186 9187 6cc0f984 __freea 14 API calls 9186->9187 9188 6cc0f15c 9187->9188 9189 6cc0f984 __freea 14 API calls 9188->9189 9190 6cc0f167 9189->9190 9191 6cc0f984 __freea 14 API calls 9190->9191 9192 6cc0f175 9191->9192 9197 6cc0ef1f 9192->9197 9198 6cc0ef2b __FrameHandler3::FrameUnwindToState 9197->9198 9213 6cc0f563 EnterCriticalSection 9198->9213 9200 6cc0ef5f 9214 6cc0ef7e 9200->9214 9202 6cc0ef35 9202->9200 9204 6cc0f984 __freea 14 API calls 9202->9204 9204->9200 9205 6cc0ef8a 9206 6cc0ef96 __FrameHandler3::FrameUnwindToState 9205->9206 9218 6cc0f563 EnterCriticalSection 9206->9218 9208 6cc0efa0 9209 6cc0f1c0 _unexpected 14 API calls 9208->9209 9210 6cc0efb3 9209->9210 9219 6cc0efd3 9210->9219 9213->9202 9217 6cc0f5ab LeaveCriticalSection 9214->9217 9216 6cc0ef6c 9216->9205 9217->9216 9218->9208 9222 6cc0f5ab LeaveCriticalSection 9219->9222 9221 6cc0efc1 9221->9170 9222->9221 9224 6cc0c6ed 9223->9224 9230 6cc0b494 9223->9230 9231 6cc0cdb3 9224->9231 9227 6cc0cdee ___vcrt_FlsSetValue 6 API calls 9228 6cc0c703 9227->9228 9236 6cc0c6c7 9228->9236 9230->9047 9232 6cc0cc52 ___vcrt_FlsFree 5 API calls 9231->9232 9233 6cc0cdcd 9232->9233 9234 6cc0cde5 TlsGetValue 9233->9234 9235 6cc0c6f4 9233->9235 9234->9235 9235->9227 9237 6cc0c6d1 9236->9237 9239 6cc0c6de 9236->9239 9238 6cc0eb99 ___std_exception_destroy 14 API calls 9237->9238 9237->9239 9238->9239 9239->9230 9246 6cc0c71c 9240->9246 9242 6cc0b470 9242->9070 9243 6cc0eb08 9242->9243 9244 6cc0f388 __dosmaperr 14 API calls 9243->9244 9245 6cc0b47c 9244->9245 9245->9073 9245->9074 9247 6cc0c725 9246->9247 9248 6cc0c728 GetLastError 9246->9248 9247->9242 9249 6cc0cdb3 ___vcrt_FlsGetValue 6 API calls 9248->9249 9250 6cc0c73d 9249->9250 9251 6cc0c7a2 SetLastError 9250->9251 9252 6cc0cdee ___vcrt_FlsSetValue 6 API calls 9250->9252 9259 6cc0c75c 9250->9259 9251->9242 9253 6cc0c756 __FrameHandler3::FrameUnwindToState 9252->9253 9254 6cc0cdee ___vcrt_FlsSetValue 6 API calls 9253->9254 9256 6cc0c77e 9253->9256 9253->9259 9254->9256 9255 6cc0cdee ___vcrt_FlsSetValue 6 API calls 9257 6cc0c792 9255->9257 9256->9255 9256->9257 9258 6cc0eb99 ___std_exception_destroy 14 API calls 9257->9258 9258->9259 9259->9251 9361 6cc0c3de 9364 6cc0c42c 9361->9364 9365 6cc0c3e9 9364->9365 9366 6cc0c435 9364->9366 9366->9365 9373 6cc0c70e 9366->9373 9368 6cc0c470 9369 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9368->9369 9370 6cc0c47b 9369->9370 9386 6cc0eb5d 9370->9386 9374 6cc0c71c __FrameHandler3::FrameUnwindToState 23 API calls 9373->9374 9375 6cc0c713 9374->9375 9375->9368 9376 6cc11815 __FrameHandler3::FrameUnwindToState 2 API calls 9375->9376 9377 6cc0ec1e 9376->9377 9378 6cc0ec29 9377->9378 9379 6cc1185a __FrameHandler3::FrameUnwindToState 39 API calls 9377->9379 9380 6cc0ec33 IsProcessorFeaturePresent 9378->9380 9381 6cc0ec52 9378->9381 9379->9378 9383 6cc0ec3f 9380->9383 9382 6cc0e31e __FrameHandler3::FrameUnwindToState 21 API calls 9381->9382 9385 6cc0ec5c 9382->9385 9384 6cc0f637 __FrameHandler3::FrameUnwindToState 8 API calls 9383->9384 9384->9381 9387 6cc0eb69 __FrameHandler3::FrameUnwindToState 9386->9387 9388 6cc0f237 _unexpected 39 API calls 9387->9388 9391 6cc0eb6e 9388->9391 9389 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9390 6cc0eb98 9389->9390 9391->9389 9937 6cc11d5e 9938 6cc11d6b 9937->9938 9939 6cc0f927 _unexpected 14 API calls 9938->9939 9940 6cc11d85 9939->9940 9941 6cc0f984 __freea 14 API calls 9940->9941 9942 6cc11d91 9941->9942 9943 6cc0f927 _unexpected 14 API calls 9942->9943 9947 6cc11db7 9942->9947 9945 6cc11dab 9943->9945 9944 6cc112e8 6 API calls 9944->9947 9946 6cc0f984 __freea 14 API calls 9945->9946 9946->9947 9947->9944 9948 6cc11dc3 9947->9948 9392 6cc0cae2 9393 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9392->9393 9394 6cc0caf4 ___CxxFrameHandler 9393->9394 9395 6cc12ae5 9397 6cc12a2e 9395->9397 9396 6cc12a48 9398 6cc0f914 __dosmaperr 14 API calls 9396->9398 9399 6cc12a5c 9396->9399 9397->9396 9397->9399 9401 6cc12a81 9397->9401 9403 6cc12a52 9398->9403 9400 6cc0f833 ___std_exception_copy 29 API calls 9400->9399 9401->9399 9402 6cc0f914 __dosmaperr 14 API calls 9401->9402 9402->9403 9403->9400 9404 6cc0daec 9407 6cc0c4cf 9404->9407 9408 6cc0c4e1 9407->9408 9409 6cc0c4f3 9407->9409 9408->9409 9410 6cc0c4e9 9408->9410 9411 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9409->9411 9413 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9410->9413 9417 6cc0c4f1 9410->9417 9412 6cc0c4f8 9411->9412 9414 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9412->9414 9412->9417 9415 6cc0c511 9413->9415 9414->9417 9416 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9415->9416 9418 6cc0c51c 9416->9418 9419 6cc0eb5d _unexpected 39 API calls 9418->9419 9420 6cc0c524 9419->9420 9421 6cc115ec 9424 6cc115f1 9421->9424 9423 6cc11614 9424->9423 9425 6cc130cf 9424->9425 9426 6cc130dc 9425->9426 9430 6cc130fe 9425->9430 9427 6cc130f8 9426->9427 9428 6cc130ea DeleteCriticalSection 9426->9428 9429 6cc0f984 __freea 14 API calls 9427->9429 9428->9427 9428->9428 9429->9430 9430->9424 9431 6cc146ef 9432 6cc146f8 9431->9432 9433 6cc1471f 9432->9433 9434 6cc1479e 9432->9434 9435 6cc157c0 9433->9435 9438 6cc15897 20 API calls 9433->9438 9436 6cc15897 20 API calls 9434->9436 9437 6cc147ae 9436->9437 9439 6cc157be 9438->9439 9952 6cc0c170 9953 6cc0c18e __InternalCxxFrameHandler 9952->9953 9964 6cc0c130 9953->9964 9965 6cc0c142 9964->9965 9966 6cc0c14f 9964->9966 9967 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9965->9967 9967->9966 9440 6cc14ff0 9443 6cc1500e 9440->9443 9442 6cc15006 9444 6cc15013 9443->9444 9446 6cc150a8 9444->9446 9448 6cc158d3 9444->9448 9446->9442 9449 6cc158e6 DecodePointer 9448->9449 9450 6cc158f6 9448->9450 9449->9450 9451 6cc1523f 9450->9451 9452 6cc1593a 9450->9452 9453 6cc15925 9450->9453 9451->9442 9452->9451 9454 6cc0f914 __dosmaperr 14 API calls 9452->9454 9453->9451 9455 6cc0f914 __dosmaperr 14 API calls 9453->9455 9454->9451 9455->9451 9456 6cc0fdf3 9457 6cc0fe04 9456->9457 9458 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9457->9458 9459 6cc1001c 9458->9459 9460 6cc0daf6 9466 6cc0da98 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 9460->9466 9462 6cc0db11 9463 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9462->9463 9464 6cc0db16 __FrameHandler3::FrameUnwindToState 9462->9464 9465 6cc0db51 9463->9465 9466->9462 9467 6cc0db38 9466->9467 9468 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9467->9468 9469 6cc0db3d 9468->9469 9470 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9469->9470 9471 6cc0db48 9469->9471 9470->9471 9471->9462 9968 6cc12177 9971 6cc120fe 9968->9971 9972 6cc1210a __FrameHandler3::FrameUnwindToState 9971->9972 9979 6cc0f563 EnterCriticalSection 9972->9979 9974 6cc12114 9975 6cc12142 9974->9975 9977 6cc124e8 ___scrt_uninitialize_crt 14 API calls 9974->9977 9980 6cc12160 9975->9980 9977->9974 9979->9974 9983 6cc0f5ab LeaveCriticalSection 9980->9983 9982 6cc1214e 9983->9982 8068 6cc02d80 8088 6cc02da0 __FrameHandler3::FrameUnwindToState 8068->8088 8069 6cc02760 8 API calls 8069->8088 8070 6cc0a2dc 8123 6cc0ae50 8070->8123 8072 6cc0a2e6 8073 6cc09d2f WriteProcessMemory 8073->8088 8074 6cc0a188 CloseHandle 8074->8088 8075 6cc09c98 ReadProcessMemory 8075->8088 8076 6cc08d51 VirtualAllocEx 8076->8088 8077 6cc08aa1 VirtualAlloc Wow64GetThreadContext 8077->8088 8078 6cc0a0f5 ResumeThread 8078->8088 8079 6cc08c13 VirtualAllocEx 8079->8088 8080 6cc0a00d WriteProcessMemory Wow64SetThreadContext 8080->8088 8082 6cc0aa66 CloseHandle 8082->8088 8083 6cc0a113 CloseHandle 8083->8088 8084 6cc08991 CreateProcessW 8084->8088 8085 6cc0909b WriteProcessMemory 8085->8088 8086 6cc05155 GetConsoleWindow ShowWindow 8093 6cc01090 8086->8093 8088->8069 8088->8070 8088->8073 8088->8074 8088->8075 8088->8076 8088->8077 8088->8078 8088->8079 8088->8080 8088->8082 8088->8083 8088->8084 8088->8085 8088->8086 8089 6cc01090 24 API calls 8088->8089 8090 6cc0a763 CreateProcessW 8088->8090 8091 6cc0a9d5 WriteProcessMemory SetThreadContext 8088->8091 8092 6cc08da0 WriteProcessMemory 8088->8092 8119 6cc01000 8088->8119 8089->8088 8090->8088 8091->8088 8092->8088 8110 6cc010b9 __InternalCxxFrameHandler 8093->8110 8094 6cc024be 8095 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8094->8095 8097 6cc024c8 8095->8097 8096 6cc01c9b MapViewOfFile 8096->8110 8097->8088 8098 6cc0184a CreateFileA 8098->8110 8099 6cc01960 CreateFileMappingA 8099->8110 8100 6cc02568 CloseHandle 8100->8110 8101 6cc01697 GetCurrentProcess 8130 6cc0ba50 8101->8130 8103 6cc01711 GetModuleHandleA 8103->8110 8104 6cc0180b GetModuleFileNameA 8104->8110 8105 6cc017b7 K32GetModuleInformation 8105->8110 8106 6cc024d0 GetCurrentProcess 8107 6cc0ba50 __FrameHandler3::FrameUnwindToState 8106->8107 8108 6cc0250b GetModuleHandleA 8107->8108 8108->8110 8109 6cc02100 VirtualProtect 8109->8110 8110->8094 8110->8096 8110->8098 8110->8099 8110->8100 8110->8101 8110->8104 8110->8105 8110->8106 8110->8109 8111 6cc02195 VirtualProtect 8110->8111 8112 6cc023fc FindCloseChangeNotification 8110->8112 8113 6cc0273d CloseHandle 8110->8113 8114 6cc01c1a CloseHandle 8110->8114 8115 6cc0248b CloseHandle CloseHandle 8110->8115 8116 6cc02618 VirtualProtect 8110->8116 8111->8110 8112->8110 8113->8110 8114->8110 8115->8110 8132 6cc0bbb0 8116->8132 8121 6cc01021 8119->8121 8120 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8122 6cc01082 8120->8122 8121->8120 8122->8088 8124 6cc0ae58 8123->8124 8125 6cc0ae59 IsProcessorFeaturePresent 8123->8125 8124->8072 8127 6cc0b1fe 8125->8127 8134 6cc0b1c1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8127->8134 8129 6cc0b2e1 8129->8072 8131 6cc0ba67 8130->8131 8131->8103 8131->8131 8133 6cc026b5 VirtualProtect 8132->8133 8133->8110 8134->8129 9984 6cc0ea03 9987 6cc0e7e7 9984->9987 9986 6cc0ea08 9988 6cc0e7f3 __EH_prolog3 9987->9988 9997 6cc0e7b1 9988->9997 9993 6cc0e782 14 API calls 9994 6cc0e81f 9993->9994 9995 6cc0e782 14 API calls 9994->9995 9996 6cc0e82a __DllMainCRTStartup@12 9995->9996 9996->9986 9998 6cc0e7c3 9997->9998 9999 6cc0e7c9 9997->9999 10000 6cc0e782 14 API calls 9998->10000 10001 6cc0e7cc 9999->10001 10000->9999 10002 6cc0e7de 10001->10002 10004 6cc0e7e4 10001->10004 10003 6cc0e782 14 API calls 10002->10003 10003->10004 10004->9993 9479 6cc0d886 9482 6cc0da08 9479->9482 9481 6cc0d88e 9483 6cc0da4e 9482->9483 9484 6cc0da18 9482->9484 9483->9481 9484->9483 9485 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9484->9485 9486 6cc0da44 9485->9486 9486->9481 9487 6cc0fa88 9488 6cc0fab2 9487->9488 9489 6cc0fa96 9487->9489 9491 6cc0fad5 9488->9491 9492 6cc0fab9 9488->9492 9510 6cc10128 9489->9510 9493 6cc10e3c ___scrt_uninitialize_crt WideCharToMultiByte 9491->9493 9505 6cc0faa0 9492->9505 9514 6cc10142 9492->9514 9494 6cc0fae5 9493->9494 9496 6cc0fb02 9494->9496 9497 6cc0faec GetLastError 9494->9497 9499 6cc0fb13 9496->9499 9501 6cc10142 15 API calls 9496->9501 9519 6cc0f8ba 9497->9519 9499->9505 9524 6cc100c5 9499->9524 9501->9499 9503 6cc0f914 __dosmaperr 14 API calls 9503->9505 9506 6cc0fb2d GetLastError 9507 6cc0f8ba __dosmaperr 14 API calls 9506->9507 9508 6cc0fb39 9507->9508 9509 6cc0f914 __dosmaperr 14 API calls 9508->9509 9509->9505 9511 6cc1013b 9510->9511 9512 6cc10133 9510->9512 9511->9505 9513 6cc0f984 __freea 14 API calls 9512->9513 9513->9511 9515 6cc10128 14 API calls 9514->9515 9516 6cc10150 9515->9516 9527 6cc101bd 9516->9527 9530 6cc0f901 9519->9530 9521 6cc0f8c5 __dosmaperr 9522 6cc0f914 __dosmaperr 14 API calls 9521->9522 9523 6cc0f8d8 9522->9523 9523->9503 9525 6cc10e3c ___scrt_uninitialize_crt WideCharToMultiByte 9524->9525 9526 6cc0fb29 9525->9526 9526->9505 9526->9506 9528 6cc11e9a 15 API calls 9527->9528 9529 6cc1015e 9528->9529 9529->9505 9531 6cc0f388 __dosmaperr 14 API calls 9530->9531 9532 6cc0f906 9531->9532 9532->9521 8135 6cc10988 8136 6cc10991 8135->8136 8140 6cc109c3 8135->8140 8141 6cc0f2f2 8136->8141 8142 6cc0f303 8141->8142 8143 6cc0f2fd 8141->8143 8148 6cc0f309 8142->8148 8197 6cc112a6 8142->8197 8192 6cc11267 8143->8192 8147 6cc0f321 8202 6cc0f927 8147->8202 8151 6cc0f30e 8148->8151 8220 6cc0ec19 8148->8220 8169 6cc10793 8151->8169 8154 6cc0f335 8156 6cc112a6 _unexpected 6 API calls 8154->8156 8155 6cc0f34a 8157 6cc112a6 _unexpected 6 API calls 8155->8157 8158 6cc0f341 8156->8158 8159 6cc0f356 8157->8159 8209 6cc0f984 8158->8209 8160 6cc0f369 8159->8160 8161 6cc0f35a 8159->8161 8215 6cc0f039 8160->8215 8164 6cc112a6 _unexpected 6 API calls 8161->8164 8164->8158 8167 6cc0f984 __freea 14 API calls 8168 6cc0f37b 8167->8168 8168->8151 8635 6cc108e8 8169->8635 8176 6cc107fd 8660 6cc109e3 8176->8660 8177 6cc107ef 8178 6cc0f984 __freea 14 API calls 8177->8178 8180 6cc107d6 8178->8180 8180->8140 8182 6cc10835 8183 6cc0f914 __dosmaperr 14 API calls 8182->8183 8185 6cc1083a 8183->8185 8184 6cc1087c 8188 6cc108c5 8184->8188 8671 6cc1040c 8184->8671 8186 6cc0f984 __freea 14 API calls 8185->8186 8186->8180 8187 6cc10850 8187->8184 8190 6cc0f984 __freea 14 API calls 8187->8190 8189 6cc0f984 __freea 14 API calls 8188->8189 8189->8180 8190->8184 8231 6cc11105 8192->8231 8194 6cc11283 8195 6cc1129e TlsGetValue 8194->8195 8196 6cc1128c 8194->8196 8196->8142 8198 6cc11105 _unexpected 5 API calls 8197->8198 8199 6cc112c2 8198->8199 8200 6cc112e0 TlsSetValue 8199->8200 8201 6cc0f31d 8199->8201 8201->8147 8201->8148 8207 6cc0f934 _unexpected 8202->8207 8203 6cc0f974 8248 6cc0f914 8203->8248 8204 6cc0f95f HeapAlloc 8206 6cc0f32d 8204->8206 8204->8207 8206->8154 8206->8155 8207->8203 8207->8204 8245 6cc116c0 8207->8245 8210 6cc0f347 8209->8210 8211 6cc0f98f HeapFree 8209->8211 8210->8148 8211->8210 8212 6cc0f9a4 GetLastError 8211->8212 8213 6cc0f9b1 __dosmaperr 8212->8213 8214 6cc0f914 __dosmaperr 12 API calls 8213->8214 8214->8210 8285 6cc0eecd 8215->8285 8427 6cc11815 8220->8427 8224 6cc0ec33 IsProcessorFeaturePresent 8227 6cc0ec3f 8224->8227 8226 6cc0ec29 8226->8224 8230 6cc0ec52 8226->8230 8457 6cc0f637 8227->8457 8463 6cc0e31e 8230->8463 8232 6cc11135 8231->8232 8236 6cc11131 _unexpected 8231->8236 8232->8236 8237 6cc1103a 8232->8237 8235 6cc1114f GetProcAddress 8235->8236 8236->8194 8242 6cc1104b ___vcrt_FlsFree 8237->8242 8238 6cc110e1 8238->8235 8238->8236 8239 6cc11069 LoadLibraryExW 8240 6cc11084 GetLastError 8239->8240 8241 6cc110e8 8239->8241 8240->8242 8241->8238 8243 6cc110fa FreeLibrary 8241->8243 8242->8238 8242->8239 8244 6cc110b7 LoadLibraryExW 8242->8244 8243->8238 8244->8241 8244->8242 8251 6cc116ec 8245->8251 8262 6cc0f388 GetLastError 8248->8262 8250 6cc0f919 8250->8206 8252 6cc116f8 __FrameHandler3::FrameUnwindToState 8251->8252 8257 6cc0f563 EnterCriticalSection 8252->8257 8254 6cc11703 __FrameHandler3::FrameUnwindToState 8258 6cc1173a 8254->8258 8257->8254 8261 6cc0f5ab LeaveCriticalSection 8258->8261 8260 6cc116cb 8260->8207 8261->8260 8263 6cc0f3a4 8262->8263 8264 6cc0f39e 8262->8264 8266 6cc112a6 _unexpected 6 API calls 8263->8266 8282 6cc0f3a8 SetLastError 8263->8282 8265 6cc11267 _unexpected 6 API calls 8264->8265 8265->8263 8267 6cc0f3c0 8266->8267 8269 6cc0f927 _unexpected 12 API calls 8267->8269 8267->8282 8270 6cc0f3d5 8269->8270 8271 6cc0f3dd 8270->8271 8272 6cc0f3ee 8270->8272 8274 6cc112a6 _unexpected 6 API calls 8271->8274 8273 6cc112a6 _unexpected 6 API calls 8272->8273 8275 6cc0f3fa 8273->8275 8276 6cc0f3eb 8274->8276 8277 6cc0f415 8275->8277 8278 6cc0f3fe 8275->8278 8280 6cc0f984 __freea 12 API calls 8276->8280 8281 6cc0f039 _unexpected 12 API calls 8277->8281 8279 6cc112a6 _unexpected 6 API calls 8278->8279 8279->8276 8280->8282 8283 6cc0f420 8281->8283 8282->8250 8284 6cc0f984 __freea 12 API calls 8283->8284 8284->8282 8286 6cc0eed9 __FrameHandler3::FrameUnwindToState 8285->8286 8299 6cc0f563 EnterCriticalSection 8286->8299 8288 6cc0eee3 8300 6cc0ef13 8288->8300 8291 6cc0efdf 8292 6cc0efeb __FrameHandler3::FrameUnwindToState 8291->8292 8304 6cc0f563 EnterCriticalSection 8292->8304 8294 6cc0eff5 8305 6cc0f1c0 8294->8305 8296 6cc0f00d 8309 6cc0f02d 8296->8309 8299->8288 8303 6cc0f5ab LeaveCriticalSection 8300->8303 8302 6cc0ef01 8302->8291 8303->8302 8304->8294 8306 6cc0f1f6 _unexpected 8305->8306 8307 6cc0f1cf _unexpected 8305->8307 8306->8296 8307->8306 8312 6cc1221b 8307->8312 8426 6cc0f5ab LeaveCriticalSection 8309->8426 8311 6cc0f01b 8311->8167 8313 6cc1229b 8312->8313 8316 6cc12231 8312->8316 8315 6cc0f984 __freea 14 API calls 8313->8315 8338 6cc122e9 8313->8338 8317 6cc122bd 8315->8317 8316->8313 8319 6cc0f984 __freea 14 API calls 8316->8319 8335 6cc12264 8316->8335 8318 6cc0f984 __freea 14 API calls 8317->8318 8320 6cc122d0 8318->8320 8322 6cc12259 8319->8322 8323 6cc0f984 __freea 14 API calls 8320->8323 8321 6cc0f984 __freea 14 API calls 8325 6cc12290 8321->8325 8340 6cc14196 8322->8340 8330 6cc122de 8323->8330 8324 6cc0f984 __freea 14 API calls 8331 6cc1227b 8324->8331 8332 6cc0f984 __freea 14 API calls 8325->8332 8326 6cc12357 8327 6cc0f984 __freea 14 API calls 8326->8327 8333 6cc1235d 8327->8333 8328 6cc0f984 14 API calls __freea 8334 6cc122f7 8328->8334 8336 6cc0f984 __freea 14 API calls 8330->8336 8368 6cc14294 8331->8368 8332->8313 8333->8306 8334->8326 8334->8328 8335->8324 8339 6cc12286 8335->8339 8336->8338 8380 6cc1238c 8338->8380 8339->8321 8341 6cc141a7 8340->8341 8367 6cc14290 8340->8367 8342 6cc141b8 8341->8342 8343 6cc0f984 __freea 14 API calls 8341->8343 8344 6cc0f984 __freea 14 API calls 8342->8344 8345 6cc141ca 8342->8345 8343->8342 8344->8345 8346 6cc141dc 8345->8346 8347 6cc0f984 __freea 14 API calls 8345->8347 8348 6cc141ee 8346->8348 8349 6cc0f984 __freea 14 API calls 8346->8349 8347->8346 8350 6cc14200 8348->8350 8352 6cc0f984 __freea 14 API calls 8348->8352 8349->8348 8351 6cc14212 8350->8351 8353 6cc0f984 __freea 14 API calls 8350->8353 8354 6cc14224 8351->8354 8355 6cc0f984 __freea 14 API calls 8351->8355 8352->8350 8353->8351 8356 6cc14236 8354->8356 8357 6cc0f984 __freea 14 API calls 8354->8357 8355->8354 8358 6cc14248 8356->8358 8360 6cc0f984 __freea 14 API calls 8356->8360 8357->8356 8359 6cc1425a 8358->8359 8361 6cc0f984 __freea 14 API calls 8358->8361 8362 6cc1426c 8359->8362 8363 6cc0f984 __freea 14 API calls 8359->8363 8360->8358 8361->8359 8364 6cc1427e 8362->8364 8365 6cc0f984 __freea 14 API calls 8362->8365 8363->8362 8366 6cc0f984 __freea 14 API calls 8364->8366 8364->8367 8365->8364 8366->8367 8367->8335 8369 6cc142a1 8368->8369 8370 6cc142f9 8368->8370 8371 6cc142b1 8369->8371 8372 6cc0f984 __freea 14 API calls 8369->8372 8370->8339 8373 6cc142c3 8371->8373 8374 6cc0f984 __freea 14 API calls 8371->8374 8372->8371 8375 6cc142d5 8373->8375 8376 6cc0f984 __freea 14 API calls 8373->8376 8374->8373 8377 6cc142e7 8375->8377 8378 6cc0f984 __freea 14 API calls 8375->8378 8376->8375 8377->8370 8379 6cc0f984 __freea 14 API calls 8377->8379 8378->8377 8379->8370 8381 6cc12399 8380->8381 8385 6cc123b8 8380->8385 8381->8385 8386 6cc14322 8381->8386 8384 6cc0f984 __freea 14 API calls 8384->8385 8385->8334 8387 6cc14333 8386->8387 8421 6cc123b2 8386->8421 8422 6cc142fd 8387->8422 8390 6cc142fd _unexpected 14 API calls 8391 6cc14346 8390->8391 8392 6cc142fd _unexpected 14 API calls 8391->8392 8393 6cc14351 8392->8393 8394 6cc142fd _unexpected 14 API calls 8393->8394 8395 6cc1435c 8394->8395 8396 6cc142fd _unexpected 14 API calls 8395->8396 8397 6cc1436a 8396->8397 8398 6cc0f984 __freea 14 API calls 8397->8398 8399 6cc14375 8398->8399 8400 6cc0f984 __freea 14 API calls 8399->8400 8401 6cc14380 8400->8401 8402 6cc0f984 __freea 14 API calls 8401->8402 8403 6cc1438b 8402->8403 8404 6cc142fd _unexpected 14 API calls 8403->8404 8405 6cc14399 8404->8405 8406 6cc142fd _unexpected 14 API calls 8405->8406 8407 6cc143a7 8406->8407 8408 6cc142fd _unexpected 14 API calls 8407->8408 8409 6cc143b8 8408->8409 8410 6cc142fd _unexpected 14 API calls 8409->8410 8411 6cc143c6 8410->8411 8412 6cc142fd _unexpected 14 API calls 8411->8412 8413 6cc143d4 8412->8413 8414 6cc0f984 __freea 14 API calls 8413->8414 8415 6cc143df 8414->8415 8416 6cc0f984 __freea 14 API calls 8415->8416 8417 6cc143ea 8416->8417 8418 6cc0f984 __freea 14 API calls 8417->8418 8419 6cc143f5 8418->8419 8420 6cc0f984 __freea 14 API calls 8419->8420 8420->8421 8421->8384 8423 6cc1430f 8422->8423 8424 6cc1431e 8423->8424 8425 6cc0f984 __freea 14 API calls 8423->8425 8424->8390 8425->8423 8426->8311 8466 6cc11743 8427->8466 8430 6cc1185a 8431 6cc11866 __FrameHandler3::FrameUnwindToState 8430->8431 8432 6cc0f388 __dosmaperr 14 API calls 8431->8432 8433 6cc118b6 8431->8433 8434 6cc118c8 __FrameHandler3::FrameUnwindToState 8431->8434 8439 6cc11897 __FrameHandler3::FrameUnwindToState 8431->8439 8432->8439 8435 6cc0f914 __dosmaperr 14 API calls 8433->8435 8436 6cc118fe __FrameHandler3::FrameUnwindToState 8434->8436 8480 6cc0f563 EnterCriticalSection 8434->8480 8437 6cc118bb 8435->8437 8442 6cc11a38 8436->8442 8443 6cc1193b 8436->8443 8453 6cc11969 8436->8453 8477 6cc0f833 8437->8477 8439->8433 8439->8434 8456 6cc118a0 8439->8456 8444 6cc11a43 8442->8444 8512 6cc0f5ab LeaveCriticalSection 8442->8512 8443->8453 8481 6cc0f237 GetLastError 8443->8481 8447 6cc0e31e __FrameHandler3::FrameUnwindToState 21 API calls 8444->8447 8449 6cc11a4b 8447->8449 8451 6cc0f237 _unexpected 39 API calls 8454 6cc119be 8451->8454 8452 6cc0f237 _unexpected 39 API calls 8452->8453 8508 6cc119e4 8453->8508 8455 6cc0f237 _unexpected 39 API calls 8454->8455 8454->8456 8455->8456 8456->8226 8458 6cc0f653 __FrameHandler3::FrameUnwindToState 8457->8458 8459 6cc0f67f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8458->8459 8462 6cc0f750 __FrameHandler3::FrameUnwindToState 8459->8462 8460 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8461 6cc0f76e 8460->8461 8461->8230 8462->8460 8562 6cc0e15b 8463->8562 8467 6cc1174f __FrameHandler3::FrameUnwindToState 8466->8467 8472 6cc0f563 EnterCriticalSection 8467->8472 8469 6cc1175d 8473 6cc1179f 8469->8473 8472->8469 8476 6cc0f5ab LeaveCriticalSection 8473->8476 8475 6cc0ec1e 8475->8226 8475->8430 8476->8475 8513 6cc0f77f 8477->8513 8479 6cc0f83f 8479->8456 8480->8436 8482 6cc0f253 8481->8482 8483 6cc0f24d 8481->8483 8485 6cc112a6 _unexpected 6 API calls 8482->8485 8487 6cc0f257 SetLastError 8482->8487 8484 6cc11267 _unexpected 6 API calls 8483->8484 8484->8482 8486 6cc0f26f 8485->8486 8486->8487 8489 6cc0f927 _unexpected 14 API calls 8486->8489 8491 6cc0f2e7 8487->8491 8492 6cc0f2ec 8487->8492 8490 6cc0f284 8489->8490 8494 6cc0f28c 8490->8494 8495 6cc0f29d 8490->8495 8491->8452 8493 6cc0ec19 __FrameHandler3::FrameUnwindToState 37 API calls 8492->8493 8497 6cc0f2f1 8493->8497 8498 6cc112a6 _unexpected 6 API calls 8494->8498 8496 6cc112a6 _unexpected 6 API calls 8495->8496 8499 6cc0f2a9 8496->8499 8502 6cc0f29a 8498->8502 8500 6cc0f2c4 8499->8500 8501 6cc0f2ad 8499->8501 8505 6cc0f039 _unexpected 14 API calls 8500->8505 8503 6cc112a6 _unexpected 6 API calls 8501->8503 8504 6cc0f984 __freea 14 API calls 8502->8504 8503->8502 8504->8487 8506 6cc0f2cf 8505->8506 8507 6cc0f984 __freea 14 API calls 8506->8507 8507->8487 8509 6cc119b0 8508->8509 8510 6cc119e8 8508->8510 8509->8451 8509->8454 8509->8456 8561 6cc0f5ab LeaveCriticalSection 8510->8561 8512->8444 8514 6cc0f791 ___std_exception_copy 8513->8514 8517 6cc0f7b6 8514->8517 8516 6cc0f7a9 ___std_exception_copy 8516->8479 8518 6cc0f7cd 8517->8518 8519 6cc0f7c6 8517->8519 8524 6cc0f7db 8518->8524 8532 6cc0f60e 8518->8532 8528 6cc0ed00 GetLastError 8519->8528 8522 6cc0f802 8522->8524 8535 6cc0f843 IsProcessorFeaturePresent 8522->8535 8524->8516 8525 6cc0f832 8526 6cc0f77f ___std_exception_copy 29 API calls 8525->8526 8527 6cc0f83f 8526->8527 8527->8516 8529 6cc0ed19 8528->8529 8539 6cc0f439 8529->8539 8533 6cc0f632 8532->8533 8534 6cc0f619 GetLastError SetLastError 8532->8534 8533->8522 8534->8522 8536 6cc0f84f 8535->8536 8537 6cc0f637 __FrameHandler3::FrameUnwindToState 8 API calls 8536->8537 8538 6cc0f864 GetCurrentProcess TerminateProcess 8537->8538 8538->8525 8540 6cc0f452 8539->8540 8541 6cc0f44c 8539->8541 8542 6cc112a6 _unexpected 6 API calls 8540->8542 8560 6cc0ed35 SetLastError 8540->8560 8543 6cc11267 _unexpected 6 API calls 8541->8543 8544 6cc0f46c 8542->8544 8543->8540 8545 6cc0f927 _unexpected 14 API calls 8544->8545 8544->8560 8546 6cc0f47c 8545->8546 8547 6cc0f484 8546->8547 8548 6cc0f499 8546->8548 8549 6cc112a6 _unexpected 6 API calls 8547->8549 8550 6cc112a6 _unexpected 6 API calls 8548->8550 8552 6cc0f490 8549->8552 8551 6cc0f4a5 8550->8551 8553 6cc0f4b8 8551->8553 8554 6cc0f4a9 8551->8554 8557 6cc0f984 __freea 14 API calls 8552->8557 8556 6cc0f039 _unexpected 14 API calls 8553->8556 8555 6cc112a6 _unexpected 6 API calls 8554->8555 8555->8552 8558 6cc0f4c3 8556->8558 8557->8560 8559 6cc0f984 __freea 14 API calls 8558->8559 8559->8560 8560->8518 8561->8509 8563 6cc0e188 8562->8563 8564 6cc0e199 8562->8564 8573 6cc0e223 GetModuleHandleW 8563->8573 8580 6cc0e00b 8564->8580 8569 6cc0e1d7 8574 6cc0e18d 8573->8574 8574->8564 8575 6cc0e27e GetModuleHandleExW 8574->8575 8576 6cc0e2bd GetProcAddress 8575->8576 8577 6cc0e2d1 8575->8577 8576->8577 8578 6cc0e2e4 FreeLibrary 8577->8578 8579 6cc0e2ed 8577->8579 8578->8579 8579->8564 8581 6cc0e017 __FrameHandler3::FrameUnwindToState 8580->8581 8595 6cc0f563 EnterCriticalSection 8581->8595 8583 6cc0e021 8596 6cc0e073 8583->8596 8585 6cc0e02e 8600 6cc0e04c 8585->8600 8588 6cc0e1f2 8625 6cc0e265 8588->8625 8590 6cc0e1fc 8591 6cc0e210 8590->8591 8592 6cc0e200 GetCurrentProcess TerminateProcess 8590->8592 8593 6cc0e27e __FrameHandler3::FrameUnwindToState 3 API calls 8591->8593 8592->8591 8594 6cc0e218 ExitProcess 8593->8594 8595->8583 8598 6cc0e07f __FrameHandler3::FrameUnwindToState 8596->8598 8597 6cc0e0e3 __FrameHandler3::FrameUnwindToState 8597->8585 8598->8597 8603 6cc0e972 8598->8603 8624 6cc0f5ab LeaveCriticalSection 8600->8624 8602 6cc0e03a 8602->8569 8602->8588 8604 6cc0e97e __EH_prolog3 8603->8604 8607 6cc0e83d 8604->8607 8606 6cc0e9a5 __DllMainCRTStartup@12 8606->8597 8608 6cc0e849 __FrameHandler3::FrameUnwindToState 8607->8608 8615 6cc0f563 EnterCriticalSection 8608->8615 8610 6cc0e857 8616 6cc0e898 8610->8616 8615->8610 8617 6cc0e864 8616->8617 8618 6cc0e8b7 8616->8618 8620 6cc0e88c 8617->8620 8618->8617 8619 6cc0f984 __freea 14 API calls 8618->8619 8619->8617 8623 6cc0f5ab LeaveCriticalSection 8620->8623 8622 6cc0e875 8622->8606 8623->8622 8624->8602 8628 6cc0f5e7 8625->8628 8627 6cc0e26a __FrameHandler3::FrameUnwindToState 8627->8590 8629 6cc0f5f6 __FrameHandler3::FrameUnwindToState 8628->8629 8630 6cc0f603 8629->8630 8632 6cc1118a 8629->8632 8630->8627 8633 6cc11105 _unexpected 5 API calls 8632->8633 8634 6cc111a6 8633->8634 8634->8630 8636 6cc108f4 __FrameHandler3::FrameUnwindToState 8635->8636 8637 6cc1090e 8636->8637 8679 6cc0f563 EnterCriticalSection 8636->8679 8640 6cc107bd 8637->8640 8642 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 8637->8642 8639 6cc1091e 8644 6cc0f984 __freea 14 API calls 8639->8644 8645 6cc1094a 8639->8645 8646 6cc1051a 8640->8646 8643 6cc10987 8642->8643 8644->8645 8680 6cc10967 8645->8680 8684 6cc1001e 8646->8684 8649 6cc1053b GetOEMCP 8651 6cc10564 8649->8651 8650 6cc1054d 8650->8651 8652 6cc10552 GetACP 8650->8652 8651->8180 8653 6cc11e9a 8651->8653 8652->8651 8654 6cc11ed8 8653->8654 8658 6cc11ea8 _unexpected 8653->8658 8656 6cc0f914 __dosmaperr 14 API calls 8654->8656 8655 6cc11ec3 RtlAllocateHeap 8657 6cc107e7 8655->8657 8655->8658 8656->8657 8657->8176 8657->8177 8658->8654 8658->8655 8659 6cc116c0 _unexpected 2 API calls 8658->8659 8659->8658 8661 6cc1051a 41 API calls 8660->8661 8663 6cc10a03 8661->8663 8662 6cc10b08 8664 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8662->8664 8663->8662 8665 6cc10a40 IsValidCodePage 8663->8665 8668 6cc10a5b __FrameHandler3::FrameUnwindToState 8663->8668 8666 6cc1082a 8664->8666 8665->8662 8667 6cc10a52 8665->8667 8666->8182 8666->8187 8667->8668 8669 6cc10a7b GetCPInfo 8667->8669 8727 6cc105ee 8668->8727 8669->8662 8669->8668 8672 6cc10418 __FrameHandler3::FrameUnwindToState 8671->8672 8813 6cc0f563 EnterCriticalSection 8672->8813 8674 6cc10422 8814 6cc10459 8674->8814 8679->8639 8683 6cc0f5ab LeaveCriticalSection 8680->8683 8682 6cc1096e 8682->8637 8683->8682 8685 6cc10035 8684->8685 8686 6cc1003c 8684->8686 8685->8649 8685->8650 8686->8685 8687 6cc0f237 _unexpected 39 API calls 8686->8687 8688 6cc1005d 8687->8688 8692 6cc11ee8 8688->8692 8693 6cc11efb 8692->8693 8695 6cc10073 8692->8695 8693->8695 8700 6cc12467 8693->8700 8696 6cc11f46 8695->8696 8697 6cc11f6e 8696->8697 8698 6cc11f59 8696->8698 8697->8685 8698->8697 8722 6cc109d0 8698->8722 8701 6cc12473 __FrameHandler3::FrameUnwindToState 8700->8701 8702 6cc0f237 _unexpected 39 API calls 8701->8702 8703 6cc1247c 8702->8703 8704 6cc124c2 8703->8704 8713 6cc0f563 EnterCriticalSection 8703->8713 8704->8695 8706 6cc1249a 8714 6cc124e8 8706->8714 8711 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 8712 6cc124e7 8711->8712 8713->8706 8715 6cc124f6 _unexpected 8714->8715 8717 6cc124ab 8714->8717 8716 6cc1221b _unexpected 14 API calls 8715->8716 8715->8717 8716->8717 8718 6cc124c7 8717->8718 8721 6cc0f5ab LeaveCriticalSection 8718->8721 8720 6cc124be 8720->8704 8720->8711 8721->8720 8723 6cc0f237 _unexpected 39 API calls 8722->8723 8724 6cc109d5 8723->8724 8725 6cc108e8 ___scrt_uninitialize_crt 39 API calls 8724->8725 8726 6cc109e0 8725->8726 8726->8697 8728 6cc10616 GetCPInfo 8727->8728 8729 6cc106df 8727->8729 8728->8729 8734 6cc1062e 8728->8734 8730 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8729->8730 8732 6cc10791 8730->8732 8732->8662 8738 6cc12bd4 8734->8738 8737 6cc12ee4 43 API calls 8737->8729 8739 6cc1001e 39 API calls 8738->8739 8740 6cc12bf4 8739->8740 8758 6cc10d82 8740->8758 8742 6cc12cb0 8744 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8742->8744 8743 6cc12ca8 8761 6cc12cd5 8743->8761 8746 6cc10696 8744->8746 8745 6cc12c21 8745->8742 8745->8743 8748 6cc11e9a 15 API calls 8745->8748 8749 6cc12c46 __FrameHandler3::FrameUnwindToState __alloca_probe_16 8745->8749 8753 6cc12ee4 8746->8753 8748->8749 8749->8743 8750 6cc10d82 ___scrt_uninitialize_crt MultiByteToWideChar 8749->8750 8751 6cc12c8f 8750->8751 8751->8743 8752 6cc12c96 GetStringTypeW 8751->8752 8752->8743 8754 6cc1001e 39 API calls 8753->8754 8755 6cc12ef7 8754->8755 8767 6cc12cf5 8755->8767 8765 6cc10cea 8758->8765 8762 6cc12ce1 8761->8762 8763 6cc12cf2 8761->8763 8762->8763 8764 6cc0f984 __freea 14 API calls 8762->8764 8763->8742 8764->8763 8766 6cc10cfb MultiByteToWideChar 8765->8766 8766->8745 8768 6cc12d10 8767->8768 8769 6cc10d82 ___scrt_uninitialize_crt MultiByteToWideChar 8768->8769 8772 6cc12d54 8769->8772 8770 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8771 6cc106b7 8770->8771 8771->8737 8773 6cc11e9a 15 API calls 8772->8773 8775 6cc12ecf 8772->8775 8776 6cc12d7a __alloca_probe_16 8772->8776 8787 6cc12e22 8772->8787 8773->8776 8774 6cc12cd5 __freea 14 API calls 8774->8775 8775->8770 8777 6cc10d82 ___scrt_uninitialize_crt MultiByteToWideChar 8776->8777 8776->8787 8778 6cc12dc3 8777->8778 8778->8787 8795 6cc11333 8778->8795 8781 6cc12e31 8783 6cc12eba 8781->8783 8785 6cc11e9a 15 API calls 8781->8785 8788 6cc12e43 __alloca_probe_16 8781->8788 8782 6cc12df9 8784 6cc11333 6 API calls 8782->8784 8782->8787 8786 6cc12cd5 __freea 14 API calls 8783->8786 8784->8787 8785->8788 8786->8787 8787->8774 8788->8783 8789 6cc11333 6 API calls 8788->8789 8790 6cc12e86 8789->8790 8790->8783 8801 6cc10e3c 8790->8801 8792 6cc12ea0 8792->8783 8793 6cc12ea9 8792->8793 8794 6cc12cd5 __freea 14 API calls 8793->8794 8794->8787 8804 6cc11006 8795->8804 8799 6cc11384 LCMapStringW 8800 6cc11344 8799->8800 8800->8781 8800->8782 8800->8787 8803 6cc10e4f ___scrt_uninitialize_crt 8801->8803 8802 6cc10e8d WideCharToMultiByte 8802->8792 8803->8802 8805 6cc11105 _unexpected 5 API calls 8804->8805 8806 6cc1101c 8805->8806 8806->8800 8807 6cc11390 8806->8807 8810 6cc11020 8807->8810 8809 6cc1139b 8809->8799 8811 6cc11105 _unexpected 5 API calls 8810->8811 8812 6cc11036 8811->8812 8812->8809 8813->8674 8824 6cc10be8 8814->8824 8816 6cc1047b 8817 6cc10be8 29 API calls 8816->8817 8819 6cc1049a 8817->8819 8818 6cc1042f 8821 6cc1044d 8818->8821 8819->8818 8820 6cc0f984 __freea 14 API calls 8819->8820 8820->8818 8838 6cc0f5ab LeaveCriticalSection 8821->8838 8823 6cc1043b 8823->8188 8825 6cc10bf9 8824->8825 8834 6cc10bf5 __InternalCxxFrameHandler 8824->8834 8826 6cc10c00 8825->8826 8828 6cc10c13 __FrameHandler3::FrameUnwindToState 8825->8828 8827 6cc0f914 __dosmaperr 14 API calls 8826->8827 8829 6cc10c05 8827->8829 8831 6cc10c41 8828->8831 8832 6cc10c4a 8828->8832 8828->8834 8830 6cc0f833 ___std_exception_copy 29 API calls 8829->8830 8830->8834 8833 6cc0f914 __dosmaperr 14 API calls 8831->8833 8832->8834 8836 6cc0f914 __dosmaperr 14 API calls 8832->8836 8835 6cc10c46 8833->8835 8834->8816 8837 6cc0f833 ___std_exception_copy 29 API calls 8835->8837 8836->8835 8837->8834 8838->8823 9533 6cc0eb89 9534 6cc0eb8c 9533->9534 9535 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9534->9535 9536 6cc0eb98 9535->9536 10009 6cc1140b GetProcessHeap 9537 6cc0ff8b 9538 6cc0ffa5 9537->9538 9539 6cc0ffbb FindClose 9537->9539 9547 6cc12540 9538->9547 9541 6cc0ffd5 9539->9541 9542 6cc0ffca 9539->9542 9545 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9541->9545 9544 6cc0f984 __freea 14 API calls 9542->9544 9544->9541 9546 6cc1001c 9545->9546 9548 6cc1257a 9547->9548 9549 6cc0f914 __dosmaperr 14 API calls 9548->9549 9554 6cc1258e 9548->9554 9550 6cc12583 9549->9550 9551 6cc0f833 ___std_exception_copy 29 API calls 9550->9551 9551->9554 9552 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9553 6cc0ffb8 9552->9553 9553->9539 9554->9552 9555 6cc1158c 9556 6cc11598 __FrameHandler3::FrameUnwindToState 9555->9556 9567 6cc0f563 EnterCriticalSection 9556->9567 9558 6cc1159f 9568 6cc13104 9558->9568 9565 6cc114dc 2 API calls 9566 6cc115bd 9565->9566 9587 6cc115e3 9566->9587 9567->9558 9569 6cc13110 __FrameHandler3::FrameUnwindToState 9568->9569 9570 6cc13119 9569->9570 9571 6cc1313a 9569->9571 9572 6cc0f914 __dosmaperr 14 API calls 9570->9572 9590 6cc0f563 EnterCriticalSection 9571->9590 9574 6cc1311e 9572->9574 9576 6cc0f833 ___std_exception_copy 29 API calls 9574->9576 9575 6cc13146 9580 6cc13172 9575->9580 9591 6cc13054 9575->9591 9579 6cc115ae 9576->9579 9579->9566 9581 6cc11426 GetStartupInfoW 9579->9581 9598 6cc13199 9580->9598 9582 6cc11443 9581->9582 9584 6cc114d7 9581->9584 9583 6cc13104 30 API calls 9582->9583 9582->9584 9585 6cc1146b 9583->9585 9584->9565 9585->9584 9586 6cc1149b GetFileType 9585->9586 9586->9585 9607 6cc0f5ab LeaveCriticalSection 9587->9607 9589 6cc115ce 9590->9575 9592 6cc0f927 _unexpected 14 API calls 9591->9592 9593 6cc13066 9592->9593 9597 6cc13073 9593->9597 9601 6cc112e8 9593->9601 9594 6cc0f984 __freea 14 API calls 9596 6cc130c8 9594->9596 9596->9575 9597->9594 9606 6cc0f5ab LeaveCriticalSection 9598->9606 9600 6cc131a0 9600->9579 9602 6cc11105 _unexpected 5 API calls 9601->9602 9603 6cc11304 9602->9603 9604 6cc11322 InitializeCriticalSectionAndSpinCount 9603->9604 9605 6cc1130d 9603->9605 9604->9605 9605->9593 9606->9600 9607->9589 9608 6cc0d890 9609 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9608->9609 9610 6cc0d898 __FrameHandler3::FrameUnwindToState 9609->9610 9615 6cc0da6a 9610->9615 9612 6cc0d914 9624 6cc0d94d 9612->9624 9614 6cc0d935 9616 6cc0da76 __FrameHandler3::FrameUnwindToState 9615->9616 9617 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9616->9617 9623 6cc0da91 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 9617->9623 9618 6cc0db38 __FrameHandler3::FrameUnwindToState 49 API calls 9619 6cc0db11 9618->9619 9620 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9619->9620 9621 6cc0db16 __FrameHandler3::FrameUnwindToState 9619->9621 9622 6cc0db51 9620->9622 9621->9612 9623->9618 9623->9619 9633 6cc0cb37 9624->9633 9626 6cc0d95e 9627 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9626->9627 9628 6cc0d964 9627->9628 9629 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9628->9629 9630 6cc0d96f 9629->9630 9632 6cc0d9b0 __InternalCxxFrameHandler 9630->9632 9650 6cc0c484 9630->9650 9632->9614 9634 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9633->9634 9635 6cc0cb40 9634->9635 9636 6cc0cb56 9635->9636 9637 6cc0cb48 9635->9637 9639 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9636->9639 9638 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9637->9638 9640 6cc0cb50 9638->9640 9641 6cc0cb5b 9639->9641 9640->9626 9641->9640 9642 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9641->9642 9643 6cc0cb7e 9642->9643 9644 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9643->9644 9646 6cc0cb93 ___CxxFrameHandler 9644->9646 9645 6cc0cb9e 9645->9626 9646->9645 9647 6cc0cbed 9646->9647 9653 6cc0ca8f RtlUnwind 9646->9653 9654 6cc0c96f 9647->9654 9651 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9650->9651 9652 6cc0c48c 9651->9652 9652->9632 9653->9647 9655 6cc0c991 __InternalCxxFrameHandler 9654->9655 9656 6cc0c97f 9654->9656 9657 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 9655->9657 9656->9645 9657->9656 9658 6cc0fe93 9659 6cc0fea4 9658->9659 9660 6cc0f984 __freea 14 API calls 9659->9660 9661 6cc0febc 9659->9661 9660->9661 9662 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9661->9662 9663 6cc1001c 9662->9663 9664 6cc0cf94 9665 6cc0cfab 9664->9665 9666 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9665->9666 9667 6cc0cfb0 __FrameHandler3::FrameUnwindToState 9666->9667 9670 6cc0ce73 9667->9670 9669 6cc0cfe5 __InternalCxxFrameHandler ___AdjustPointer 9671 6cc0ce7f __FrameHandler3::FrameUnwindToState 9670->9671 9672 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 9671->9672 9673 6cc0cefa __InternalCxxFrameHandler ___AdjustPointer 9671->9673 9674 6cc0cfb0 __FrameHandler3::FrameUnwindToState 9672->9674 9673->9669 9675 6cc0ce73 __InternalCxxFrameHandler 39 API calls 9674->9675 9676 6cc0cfe5 __InternalCxxFrameHandler ___AdjustPointer 9675->9676 9676->9669 9677 6cc0b497 9679 6cc0b49f ___scrt_release_startup_lock 9677->9679 9681 6cc0dea5 9679->9681 9680 6cc0b4c7 9682 6cc0deb4 9681->9682 9683 6cc0deb8 9681->9683 9682->9680 9686 6cc0dec5 9683->9686 9687 6cc0f388 __dosmaperr 14 API calls 9686->9687 9688 6cc0dec1 9687->9688 9688->9680 10010 6cc1141d GetStartupInfoW 10011 6cc11443 10010->10011 10013 6cc114d7 10010->10013 10012 6cc13104 30 API calls 10011->10012 10011->10013 10014 6cc1146b 10012->10014 10014->10013 10015 6cc1149b GetFileType 10014->10015 10015->10014 9689 6cc0d79d 9690 6cc0dd27 ___std_exception_destroy 14 API calls 9689->9690 9691 6cc0d7ac 9690->9691 8839 6cc0b19e 8840 6cc0b1a7 8839->8840 8841 6cc0b1ac 8839->8841 8856 6cc0b330 8840->8856 8845 6cc0b068 8841->8845 8847 6cc0b074 __FrameHandler3::FrameUnwindToState 8845->8847 8846 6cc0b083 8847->8846 8848 6cc0b09d dllmain_raw 8847->8848 8850 6cc0b098 __DllMainCRTStartup@12 8847->8850 8848->8846 8849 6cc0b0b7 dllmain_crt_dispatch 8848->8849 8849->8846 8849->8850 8851 6cc0b109 8850->8851 8860 6cc0afb8 8850->8860 8851->8846 8852 6cc0b112 dllmain_crt_dispatch 8851->8852 8852->8846 8853 6cc0b125 dllmain_raw 8852->8853 8853->8846 8855 6cc0b0fe dllmain_raw 8855->8851 8857 6cc0b346 8856->8857 8859 6cc0b34f 8857->8859 9035 6cc0b2e3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8857->9035 8859->8841 8862 6cc0afc4 __FrameHandler3::FrameUnwindToState __DllMainCRTStartup@12 8860->8862 8861 6cc0afcd 8861->8855 8862->8861 8863 6cc0b060 8862->8863 8864 6cc0aff5 8862->8864 8904 6cc0b69a IsProcessorFeaturePresent 8863->8904 8883 6cc0b4cb 8864->8883 8867 6cc0affa 8892 6cc0b387 8867->8892 8869 6cc0b067 __FrameHandler3::FrameUnwindToState 8871 6cc0b09d dllmain_raw 8869->8871 8878 6cc0b098 __DllMainCRTStartup@12 8869->8878 8880 6cc0b083 8869->8880 8870 6cc0afff __RTC_Initialize __DllMainCRTStartup@12 8895 6cc0b66c 8870->8895 8872 6cc0b0b7 dllmain_crt_dispatch 8871->8872 8871->8880 8872->8878 8872->8880 8876 6cc0b109 8877 6cc0b112 dllmain_crt_dispatch 8876->8877 8876->8880 8879 6cc0b125 dllmain_raw 8877->8879 8877->8880 8878->8876 8881 6cc0afb8 __DllMainCRTStartup@12 81 API calls 8878->8881 8879->8880 8880->8855 8882 6cc0b0fe dllmain_raw 8881->8882 8882->8876 8884 6cc0b4d0 ___scrt_release_startup_lock 8883->8884 8885 6cc0b4d4 8884->8885 8889 6cc0b4e0 __DllMainCRTStartup@12 8884->8889 8886 6cc0e972 __DllMainCRTStartup@12 14 API calls 8885->8886 8887 6cc0b4de 8886->8887 8887->8867 8888 6cc0b4ed 8888->8867 8889->8888 8890 6cc0e15b __FrameHandler3::FrameUnwindToState 21 API calls 8889->8890 8891 6cc0e31a 8890->8891 8891->8867 8908 6cc0c30a InterlockedFlushSList 8892->8908 8896 6cc0b678 8895->8896 8898 6cc0b01e 8896->8898 8915 6cc0eb1b 8896->8915 8901 6cc0b05a 8898->8901 8899 6cc0b686 8920 6cc0c35f 8899->8920 9018 6cc0b4ee 8901->9018 8905 6cc0b6b0 __FrameHandler3::FrameUnwindToState 8904->8905 8906 6cc0b75b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8905->8906 8907 6cc0b79f __FrameHandler3::FrameUnwindToState 8906->8907 8907->8869 8909 6cc0c31a 8908->8909 8911 6cc0b391 8908->8911 8909->8911 8912 6cc0eb99 8909->8912 8911->8870 8913 6cc0f984 __freea 14 API calls 8912->8913 8914 6cc0ebb1 8913->8914 8914->8909 8916 6cc0eb26 8915->8916 8917 6cc0eb38 ___scrt_uninitialize_crt 8915->8917 8918 6cc0eb34 8916->8918 8926 6cc11d55 8916->8926 8917->8899 8918->8899 8921 6cc0c372 8920->8921 8922 6cc0c368 8920->8922 8921->8898 8993 6cc0c7e1 8922->8993 8929 6cc11be6 8926->8929 8932 6cc11b3a 8929->8932 8933 6cc11b46 __FrameHandler3::FrameUnwindToState 8932->8933 8940 6cc0f563 EnterCriticalSection 8933->8940 8935 6cc11bbc 8949 6cc11bda 8935->8949 8936 6cc11b50 ___scrt_uninitialize_crt 8936->8935 8941 6cc11aae 8936->8941 8940->8936 8942 6cc11aba __FrameHandler3::FrameUnwindToState 8941->8942 8952 6cc11e72 EnterCriticalSection 8942->8952 8944 6cc11afd 8964 6cc11b2e 8944->8964 8945 6cc11ac4 ___scrt_uninitialize_crt 8945->8944 8953 6cc11cf0 8945->8953 8992 6cc0f5ab LeaveCriticalSection 8949->8992 8951 6cc11bc8 8951->8918 8952->8945 8954 6cc11d05 ___std_exception_copy 8953->8954 8955 6cc11d17 8954->8955 8956 6cc11d0c 8954->8956 8967 6cc11c87 8955->8967 8958 6cc11be6 ___scrt_uninitialize_crt 68 API calls 8956->8958 8960 6cc11d12 ___std_exception_copy 8958->8960 8960->8944 8962 6cc11d38 8980 6cc13385 8962->8980 8991 6cc11e86 LeaveCriticalSection 8964->8991 8966 6cc11b1c 8966->8936 8968 6cc11ca0 8967->8968 8969 6cc11cc7 8967->8969 8968->8969 8970 6cc120d7 ___scrt_uninitialize_crt 29 API calls 8968->8970 8969->8960 8973 6cc120d7 8969->8973 8971 6cc11cbc 8970->8971 8972 6cc13ba4 ___scrt_uninitialize_crt 64 API calls 8971->8972 8972->8969 8974 6cc120e3 8973->8974 8975 6cc120f8 8973->8975 8976 6cc0f914 __dosmaperr 14 API calls 8974->8976 8975->8962 8977 6cc120e8 8976->8977 8978 6cc0f833 ___std_exception_copy 29 API calls 8977->8978 8979 6cc120f3 8978->8979 8979->8962 8981 6cc13396 8980->8981 8984 6cc133a3 8980->8984 8983 6cc0f914 __dosmaperr 14 API calls 8981->8983 8982 6cc133ec 8985 6cc0f914 __dosmaperr 14 API calls 8982->8985 8990 6cc1339b 8983->8990 8984->8982 8986 6cc133ca 8984->8986 8987 6cc133f1 8985->8987 8988 6cc132e3 ___scrt_uninitialize_crt 33 API calls 8986->8988 8989 6cc0f833 ___std_exception_copy 29 API calls 8987->8989 8988->8990 8989->8990 8990->8960 8991->8966 8992->8951 8994 6cc0c36d 8993->8994 8995 6cc0c7eb 8993->8995 8997 6cc0c838 8994->8997 9001 6cc0cd78 8995->9001 8998 6cc0c862 8997->8998 8999 6cc0c843 8997->8999 8998->8921 9000 6cc0c84d DeleteCriticalSection 8999->9000 9000->8998 9000->9000 9006 6cc0cc52 9001->9006 9004 6cc0cdaa TlsFree 9005 6cc0cd9e 9004->9005 9005->8994 9007 6cc0cc6f 9006->9007 9008 6cc0cc73 9006->9008 9007->9004 9007->9005 9008->9007 9009 6cc0ccdb GetProcAddress 9008->9009 9011 6cc0cccc 9008->9011 9013 6cc0ccf2 LoadLibraryExW 9008->9013 9009->9007 9011->9009 9012 6cc0ccd4 FreeLibrary 9011->9012 9012->9009 9014 6cc0cd09 GetLastError 9013->9014 9015 6cc0cd39 9013->9015 9014->9015 9016 6cc0cd14 ___vcrt_FlsFree 9014->9016 9015->9008 9016->9015 9017 6cc0cd2a LoadLibraryExW 9016->9017 9017->9008 9023 6cc0eb4b 9018->9023 9021 6cc0c7e1 ___vcrt_uninitialize_ptd 6 API calls 9022 6cc0b05f 9021->9022 9022->8861 9026 6cc0f508 9023->9026 9027 6cc0f512 9026->9027 9028 6cc0b4f5 9026->9028 9030 6cc11228 9027->9030 9028->9021 9031 6cc11105 _unexpected 5 API calls 9030->9031 9032 6cc11244 9031->9032 9033 6cc1124d 9032->9033 9034 6cc1125f TlsFree 9032->9034 9033->9028 9035->8859 9692 6cc146a1 9693 6cc146c1 9692->9693 9696 6cc146f8 9693->9696 9695 6cc146eb 9697 6cc146ff 9696->9697 9698 6cc1479e 9697->9698 9700 6cc1471f 9697->9700 9701 6cc15897 20 API calls 9698->9701 9699 6cc157c0 9699->9695 9700->9695 9700->9699 9703 6cc15897 20 API calls 9700->9703 9702 6cc147ae 9701->9702 9702->9695 9704 6cc157be 9703->9704 9704->9695 9708 6cc100a0 9709 6cc100aa 9708->9709 9710 6cc100ba 9709->9710 9711 6cc0f984 __freea 14 API calls 9709->9711 9712 6cc0f984 __freea 14 API calls 9710->9712 9711->9709 9713 6cc100c1 9712->9713 10016 6cc0f522 10017 6cc0f52d 10016->10017 10018 6cc112e8 6 API calls 10017->10018 10019 6cc0f556 10017->10019 10020 6cc0f552 10017->10020 10018->10017 10022 6cc0f57a 10019->10022 10023 6cc0f587 10022->10023 10025 6cc0f5a6 10022->10025 10024 6cc0f591 DeleteCriticalSection 10023->10024 10024->10024 10024->10025 10025->10020 10026 6cc11e26 10027 6cc11d55 ___scrt_uninitialize_crt 68 API calls 10026->10027 10028 6cc11e2e 10027->10028 10036 6cc13ed1 10028->10036 10030 6cc11e33 10046 6cc13f7c 10030->10046 10033 6cc11e5d 10034 6cc0f984 __freea 14 API calls 10033->10034 10035 6cc11e68 10034->10035 10037 6cc13edd __FrameHandler3::FrameUnwindToState 10036->10037 10050 6cc0f563 EnterCriticalSection 10037->10050 10039 6cc13f54 10055 6cc13f73 10039->10055 10042 6cc13f28 DeleteCriticalSection 10044 6cc0f984 __freea 14 API calls 10042->10044 10045 6cc13ee8 10044->10045 10045->10039 10045->10042 10051 6cc1466f 10045->10051 10047 6cc13f93 10046->10047 10048 6cc11e42 DeleteCriticalSection 10046->10048 10047->10048 10049 6cc0f984 __freea 14 API calls 10047->10049 10048->10030 10048->10033 10049->10048 10050->10045 10052 6cc14682 ___std_exception_copy 10051->10052 10058 6cc1454a 10052->10058 10054 6cc1468e ___std_exception_copy 10054->10045 10143 6cc0f5ab LeaveCriticalSection 10055->10143 10057 6cc13f60 10057->10030 10059 6cc14556 __FrameHandler3::FrameUnwindToState 10058->10059 10060 6cc14560 10059->10060 10061 6cc14583 10059->10061 10062 6cc0f7b6 ___std_exception_copy 29 API calls 10060->10062 10068 6cc1457b 10061->10068 10069 6cc11e72 EnterCriticalSection 10061->10069 10062->10068 10064 6cc145a1 10070 6cc145e1 10064->10070 10066 6cc145ae 10084 6cc145d9 10066->10084 10068->10054 10069->10064 10071 6cc14611 10070->10071 10072 6cc145ee 10070->10072 10074 6cc14609 10071->10074 10075 6cc11c87 ___scrt_uninitialize_crt 64 API calls 10071->10075 10073 6cc0f7b6 ___std_exception_copy 29 API calls 10072->10073 10073->10074 10074->10066 10076 6cc14629 10075->10076 10077 6cc13f7c 14 API calls 10076->10077 10078 6cc14631 10077->10078 10079 6cc120d7 ___scrt_uninitialize_crt 29 API calls 10078->10079 10080 6cc1463d 10079->10080 10087 6cc14e5c 10080->10087 10083 6cc0f984 __freea 14 API calls 10083->10074 10142 6cc11e86 LeaveCriticalSection 10084->10142 10086 6cc145df 10086->10068 10090 6cc14644 10087->10090 10091 6cc14e85 10087->10091 10088 6cc14ed4 10089 6cc0f7b6 ___std_exception_copy 29 API calls 10088->10089 10089->10090 10090->10074 10090->10083 10091->10088 10092 6cc14eac 10091->10092 10094 6cc14dcb 10092->10094 10095 6cc14dd7 __FrameHandler3::FrameUnwindToState 10094->10095 10102 6cc131a2 EnterCriticalSection 10095->10102 10097 6cc14de5 10099 6cc14e16 10097->10099 10103 6cc14eff 10097->10103 10116 6cc14e50 10099->10116 10102->10097 10119 6cc13279 10103->10119 10105 6cc14f15 10132 6cc131e8 10105->10132 10106 6cc14f0f 10106->10105 10108 6cc14f47 10106->10108 10109 6cc13279 ___scrt_uninitialize_crt 29 API calls 10106->10109 10108->10105 10110 6cc13279 ___scrt_uninitialize_crt 29 API calls 10108->10110 10111 6cc14f3e 10109->10111 10112 6cc14f53 CloseHandle 10110->10112 10114 6cc13279 ___scrt_uninitialize_crt 29 API calls 10111->10114 10112->10105 10113 6cc14f5f GetLastError 10112->10113 10113->10105 10114->10108 10115 6cc14f6d ___scrt_uninitialize_crt 10115->10099 10141 6cc131c5 LeaveCriticalSection 10116->10141 10118 6cc14e39 10118->10090 10120 6cc13286 10119->10120 10122 6cc1329b 10119->10122 10121 6cc0f901 __dosmaperr 14 API calls 10120->10121 10124 6cc1328b 10121->10124 10123 6cc0f901 __dosmaperr 14 API calls 10122->10123 10127 6cc132c0 10122->10127 10125 6cc132cb 10123->10125 10126 6cc0f914 __dosmaperr 14 API calls 10124->10126 10128 6cc0f914 __dosmaperr 14 API calls 10125->10128 10129 6cc13293 10126->10129 10127->10106 10130 6cc132d3 10128->10130 10129->10106 10131 6cc0f833 ___std_exception_copy 29 API calls 10130->10131 10131->10129 10133 6cc131f7 10132->10133 10134 6cc1325e 10132->10134 10133->10134 10139 6cc13221 10133->10139 10135 6cc0f914 __dosmaperr 14 API calls 10134->10135 10136 6cc13263 10135->10136 10137 6cc0f901 __dosmaperr 14 API calls 10136->10137 10138 6cc1324e 10137->10138 10138->10115 10139->10138 10140 6cc13248 SetStdHandle 10139->10140 10140->10138 10141->10118 10142->10086 10143->10057 10144 6cc12f2d 10145 6cc10988 49 API calls 10144->10145 10146 6cc12f32 10145->10146 9714 6cc147b1 9715 6cc147d5 9714->9715 9717 6cc148b1 __startOneArgErrorHandling 9715->9717 9718 6cc14826 9715->9718 9716 6cc14838 9720 6cc15f14 20 API calls 9717->9720 9721 6cc15b31 __startOneArgErrorHandling 9717->9721 9718->9716 9719 6cc158d3 15 API calls 9718->9719 9719->9716 9720->9721 10147 6cc12b30 10150 6cc12b47 10147->10150 10149 6cc12b42 10151 6cc12b55 10150->10151 10152 6cc12b69 10150->10152 10153 6cc0f914 __dosmaperr 14 API calls 10151->10153 10154 6cc12b71 10152->10154 10155 6cc12b83 10152->10155 10156 6cc12b5a 10153->10156 10157 6cc0f914 __dosmaperr 14 API calls 10154->10157 10160 6cc1001e 39 API calls 10155->10160 10161 6cc12b81 10155->10161 10158 6cc0f833 ___std_exception_copy 29 API calls 10156->10158 10159 6cc12b76 10157->10159 10162 6cc12b65 10158->10162 10163 6cc0f833 ___std_exception_copy 29 API calls 10159->10163 10160->10161 10161->10149 10162->10149 10163->10161 10164 6cc0b133 ___scrt_dllmain_exception_filter 10165 6cc0d633 10166 6cc0d641 ___except_validate_context_record 10165->10166 10167 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10166->10167 10168 6cc0d647 10167->10168 10169 6cc0d686 10168->10169 10172 6cc0d6ac 10168->10172 10173 6cc0d6a4 10168->10173 10169->10173 10174 6cc0da52 10169->10174 10172->10173 10177 6cc0d0ca 10172->10177 10175 6cc0da6a __FrameHandler3::FrameUnwindToState 49 API calls 10174->10175 10176 6cc0da65 10175->10176 10176->10173 10181 6cc0d0ea __FrameHandler3::FrameUnwindToState 10177->10181 10178 6cc0d3fd 10179 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 10178->10179 10191 6cc0d403 10178->10191 10180 6cc0d46e 10179->10180 10181->10178 10184 6cc0d1cc 10181->10184 10185 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10181->10185 10182 6cc0d3d2 10182->10178 10183 6cc0d3d0 10182->10183 10248 6cc0d46f 10182->10248 10187 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10183->10187 10184->10182 10186 6cc0d255 10184->10186 10226 6cc0d1d2 type_info::operator== 10184->10226 10188 6cc0d14c 10185->10188 10193 6cc0d36c __InternalCxxFrameHandler 10186->10193 10233 6cc0c8a3 10186->10233 10187->10178 10188->10191 10192 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10188->10192 10191->10173 10195 6cc0d15a 10192->10195 10193->10183 10194 6cc0d39c 10193->10194 10196 6cc0d3c1 10193->10196 10197 6cc0d3a6 10193->10197 10194->10183 10194->10197 10198 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10195->10198 10200 6cc0db52 __InternalCxxFrameHandler 39 API calls 10196->10200 10199 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10197->10199 10205 6cc0d162 10198->10205 10201 6cc0d3b1 10199->10201 10202 6cc0d3ca 10200->10202 10203 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10201->10203 10202->10183 10204 6cc0d42d 10202->10204 10203->10226 10207 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10204->10207 10205->10178 10206 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10205->10206 10208 6cc0d1ab 10206->10208 10209 6cc0d432 10207->10209 10208->10184 10213 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10208->10213 10211 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10209->10211 10210 6cc0eb5d _unexpected 39 API calls 10220 6cc0d40d __InternalCxxFrameHandler 10210->10220 10214 6cc0d43a 10211->10214 10212 6cc0d276 ___TypeMatch 10212->10193 10238 6cc0d04a 10212->10238 10215 6cc0d1b5 10213->10215 10268 6cc0ca8f RtlUnwind 10214->10268 10218 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10215->10218 10221 6cc0d1c0 10218->10221 10219 6cc0d44e 10223 6cc0da52 __InternalCxxFrameHandler 49 API calls 10219->10223 10265 6cc0dd46 10220->10265 10228 6cc0db52 10221->10228 10224 6cc0d45a __InternalCxxFrameHandler 10223->10224 10269 6cc0d9c9 10224->10269 10226->10210 10226->10220 10229 6cc0dbe6 10228->10229 10232 6cc0db66 ___TypeMatch 10228->10232 10230 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 10229->10230 10231 6cc0dbeb 10230->10231 10232->10184 10234 6cc0c8bf 10233->10234 10235 6cc0c8f6 10234->10235 10236 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 10234->10236 10235->10212 10237 6cc0c911 10236->10237 10239 6cc0d069 10238->10239 10240 6cc0d05c 10238->10240 10281 6cc0ca8f RtlUnwind 10239->10281 10241 6cc0cfb1 __InternalCxxFrameHandler 39 API calls 10240->10241 10241->10239 10243 6cc0d07e 10244 6cc0da6a __FrameHandler3::FrameUnwindToState 49 API calls 10243->10244 10245 6cc0d08f __FrameHandler3::FrameUnwindToState 10244->10245 10246 6cc0d7fa __InternalCxxFrameHandler 50 API calls 10245->10246 10247 6cc0d0b7 __InternalCxxFrameHandler 10246->10247 10247->10212 10249 6cc0d485 10248->10249 10260 6cc0d59a 10248->10260 10250 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10249->10250 10251 6cc0d48c 10250->10251 10252 6cc0d493 EncodePointer 10251->10252 10253 6cc0d4ce 10251->10253 10256 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10252->10256 10254 6cc0d4eb 10253->10254 10255 6cc0d59f 10253->10255 10253->10260 10258 6cc0c8a3 __InternalCxxFrameHandler 39 API calls 10254->10258 10257 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 10255->10257 10261 6cc0d4a1 10256->10261 10259 6cc0d5a4 10257->10259 10263 6cc0d502 10258->10263 10260->10183 10261->10253 10262 6cc0c96f __InternalCxxFrameHandler 49 API calls 10261->10262 10262->10253 10263->10260 10264 6cc0d04a __InternalCxxFrameHandler 50 API calls 10263->10264 10264->10263 10266 6cc0dd8d RaiseException 10265->10266 10267 6cc0dd60 10265->10267 10266->10204 10267->10266 10268->10219 10270 6cc0d9d5 __EH_prolog3_catch 10269->10270 10271 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10270->10271 10272 6cc0d9da 10271->10272 10273 6cc0d9fd 10272->10273 10282 6cc0dc7c 10272->10282 10274 6cc0ec19 __FrameHandler3::FrameUnwindToState 39 API calls 10273->10274 10276 6cc0da02 10274->10276 10281->10243 10283 6cc0c70e __FrameHandler3::FrameUnwindToState 49 API calls 10282->10283 10284 6cc0dc82 10283->10284 10285 6cc0eb5d _unexpected 39 API calls 10284->10285 10286 6cc0dc98 10285->10286 10287 6cc0ea39 10288 6cc0c35f ___scrt_uninitialize_crt 7 API calls 10287->10288 10289 6cc0ea40 10288->10289 10290 6cc0e33b 10291 6cc0e352 10290->10291 10313 6cc0e34b 10290->10313 10292 6cc0e373 10291->10292 10294 6cc0e35d 10291->10294 10293 6cc10988 49 API calls 10292->10293 10295 6cc0e379 10293->10295 10296 6cc0f914 __dosmaperr 14 API calls 10294->10296 10320 6cc1036b GetModuleFileNameW 10295->10320 10298 6cc0e362 10296->10298 10299 6cc0f833 ___std_exception_copy 29 API calls 10298->10299 10299->10313 10305 6cc0e3e1 10307 6cc0e478 39 API calls 10305->10307 10306 6cc0e3d5 10308 6cc0f914 __dosmaperr 14 API calls 10306->10308 10310 6cc0e3f7 10307->10310 10309 6cc0e3da 10308->10309 10312 6cc0f984 __freea 14 API calls 10309->10312 10310->10309 10311 6cc0e41b 10310->10311 10314 6cc0e432 10311->10314 10315 6cc0e43c 10311->10315 10312->10313 10316 6cc0f984 __freea 14 API calls 10314->10316 10317 6cc0f984 __freea 14 API calls 10315->10317 10318 6cc0e43a 10316->10318 10317->10318 10319 6cc0f984 __freea 14 API calls 10318->10319 10319->10313 10321 6cc103ab 10320->10321 10322 6cc1039a GetLastError 10320->10322 10342 6cc100e9 10321->10342 10323 6cc0f8ba __dosmaperr 14 API calls 10322->10323 10327 6cc103a6 10323->10327 10328 6cc0ae50 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 10327->10328 10329 6cc0e38c 10328->10329 10330 6cc0e478 10329->10330 10332 6cc0e49e 10330->10332 10334 6cc0e4fc 10332->10334 10378 6cc10cb9 10332->10378 10333 6cc0e3bf 10336 6cc0e5ec 10333->10336 10334->10333 10335 6cc10cb9 39 API calls 10334->10335 10335->10334 10337 6cc0e3cc 10336->10337 10338 6cc0e5fd 10336->10338 10337->10305 10337->10306 10338->10337 10339 6cc0f927 _unexpected 14 API calls 10338->10339 10340 6cc0e626 10339->10340 10341 6cc0f984 __freea 14 API calls 10340->10341 10341->10337 10343 6cc1001e 39 API calls 10342->10343 10344 6cc100fb 10343->10344 10345 6cc1010d 10344->10345 10368 6cc111ca 10344->10368 10347 6cc1026e 10345->10347 10348 6cc1028a 10347->10348 10363 6cc1027b 10347->10363 10349 6cc10292 10348->10349 10350 6cc102b7 10348->10350 10349->10363 10374 6cc10330 10349->10374 10351 6cc10e3c ___scrt_uninitialize_crt WideCharToMultiByte 10350->10351 10353 6cc102c7 10351->10353 10354 6cc102e4 10353->10354 10355 6cc102ce GetLastError 10353->10355 10357 6cc10330 14 API calls 10354->10357 10360 6cc102f5 10354->10360 10356 6cc0f8ba __dosmaperr 14 API calls 10355->10356 10359 6cc102da 10356->10359 10357->10360 10358 6cc100c5 WideCharToMultiByte 10361 6cc1030b 10358->10361 10362 6cc0f914 __dosmaperr 14 API calls 10359->10362 10360->10358 10360->10363 10361->10363 10364 6cc1030f GetLastError 10361->10364 10362->10363 10363->10327 10365 6cc0f8ba __dosmaperr 14 API calls 10364->10365 10366 6cc1031b 10365->10366 10367 6cc0f914 __dosmaperr 14 API calls 10366->10367 10367->10363 10371 6cc10fec 10368->10371 10372 6cc11105 _unexpected 5 API calls 10371->10372 10373 6cc11002 10372->10373 10373->10345 10375 6cc1033b 10374->10375 10376 6cc0f914 __dosmaperr 14 API calls 10375->10376 10377 6cc10344 10376->10377 10377->10363 10381 6cc10c69 10378->10381 10382 6cc1001e 39 API calls 10381->10382 10383 6cc10c7c 10382->10383 10383->10332 10384 6cc0d73e 10387 6cc0d771 10384->10387 10390 6cc0dcc4 10387->10390 10391 6cc0dcd1 ___std_exception_copy 10390->10391 10395 6cc0d74c 10390->10395 10392 6cc0dcfe 10391->10392 10393 6cc0ebbf ___std_exception_copy 29 API calls 10391->10393 10391->10395 10394 6cc0eb99 ___std_exception_destroy 14 API calls 10392->10394 10393->10392 10394->10395
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$Memory$Write$Thread$AllocCloseContextHandleVirtual$CreateWindowWow64$ConsoleReadResumeShow
                            • String ID: +mnL$-Vq`$;%yK$?(F}$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$Fl$H*t$HKHJ$HS/7$HS/7$Q@E^$YjoI$\'+$\'+$kernel32.dll$ntdll.dll$z$~(69$~(69$&A+$&A+$S`
                            • API String ID: 1302184485-2554451919
                            • Opcode ID: b4237b6a17e052ea0d92a6b3f58a16447fd9fd0d525268441b88b96a4166a171
                            • Instruction ID: 009976f0f76a341506d5cdf5dc448b37821a40083a92c351a588ac45fd58d7f0
                            • Opcode Fuzzy Hash: b4237b6a17e052ea0d92a6b3f58a16447fd9fd0d525268441b88b96a4166a171
                            • Instruction Fuzzy Hash: ADD30332B55215CFCB28CE3ECAD53D977F1BB86310F108295D41D9BAA4E6368AC58F81
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: Close$Handle$ProtectVirtual$ChangeFileFindNotificationView
                            • String ID: %T'$%T'$.text$;za$=280$@
                            • API String ID: 583408516-1086100020
                            • Opcode ID: 93d3d2499eb1adb3e450e2e0f4c90d248d562fc8d27d6c85f63b349fb00b9abb
                            • Instruction ID: 13a32b124e237eb5dd48364ab21f6f4e2f98a5ddc565efb5108375a72d1ad4da
                            • Opcode Fuzzy Hash: 93d3d2499eb1adb3e450e2e0f4c90d248d562fc8d27d6c85f63b349fb00b9abb
                            • Instruction Fuzzy Hash: C4C2DA75B06224CFDB14CF3DC9987D9BBF1AB8A304F008199E459EB750E6369E858F42

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1457 6cc02760-6cc02779 1458 6cc02780-6cc0278b 1457->1458 1459 6cc02791-6cc0279e 1458->1459 1460 6cc02a8a-6cc02a98 1458->1460 1463 6cc027a4-6cc027b1 1459->1463 1464 6cc02bef-6cc02c55 1459->1464 1461 6cc02c97 1460->1461 1461->1458 1466 6cc02ba1-6cc02bea 1463->1466 1467 6cc027b7-6cc027c4 1463->1467 1464->1461 1466->1461 1469 6cc02c84-6cc02c8b 1467->1469 1470 6cc027ca-6cc027d7 1467->1470 1469->1461 1472 6cc029bb-6cc02a04 1470->1472 1473 6cc027dd-6cc027ea 1470->1473 1472->1461 1475 6cc02c90 1473->1475 1476 6cc027f0-6cc027fd 1473->1476 1475->1461 1478 6cc02803-6cc02810 1476->1478 1479 6cc02c75-6cc02c7f 1476->1479 1481 6cc02b95-6cc02b9c 1478->1481 1482 6cc02816-6cc02823 1478->1482 1479->1461 1481->1461 1484 6cc02a64-6cc02a73 1482->1484 1485 6cc02829-6cc02836 1482->1485 1484->1461 1487 6cc02a09-6cc02a53 1485->1487 1488 6cc0283c-6cc02849 1485->1488 1487->1461 1490 6cc02a58-6cc02a5f 1488->1490 1491 6cc0284f-6cc0285c 1488->1491 1490->1461 1493 6cc02862-6cc0286f 1491->1493 1494 6cc02aa9-6cc02b17 1491->1494 1496 6cc02875-6cc02882 1493->1496 1497 6cc02b1c-6cc02b90 1493->1497 1494->1461 1499 6cc02888-6cc02895 1496->1499 1500 6cc02a9d-6cc02aa4 1496->1500 1497->1461 1502 6cc02a78-6cc02a85 1499->1502 1503 6cc0289b-6cc028a8 1499->1503 1500->1461 1502->1461 1505 6cc02c5a-6cc02c74 call 6cc0ae50 1503->1505 1506 6cc028ae-6cc028bb 1503->1506 1510 6cc028c1-6cc028ce 1506->1510 1511 6cc028de-6cc0296c GetModuleHandleW GetProcAddress call 6cc0ba50 1506->1511 1515 6cc02971-6cc029b6 NtQueryInformationProcess 1510->1515 1516 6cc028d4-6cc028d9 1510->1516 1511->1461 1515->1461 1516->1461
                            APIs
                            • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?), ref: 6CC0290C
                            • GetProcAddress.KERNEL32 ref: 6CC02924
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: ?KZ8$NtQueryInformationProcess$Qq:-$ntdll.dll
                            • API String ID: 1646373207-3084369345
                            • Opcode ID: 1b1329ddd724cc78c5ba4d03b4dbd197054471a6c288de99187836046e989fcc
                            • Instruction ID: 187a1436644eb10acf1fa6511ff38547cd946c996c345c7432811648dbcc4a17
                            • Opcode Fuzzy Hash: 1b1329ddd724cc78c5ba4d03b4dbd197054471a6c288de99187836046e989fcc
                            • Instruction Fuzzy Hash: FED199B6F152058FDB04CFBDD5A97DDBBF2BB8A304F119119E411DBA50E63A8909CB01

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1518 6cc0afb8-6cc0afcb call 6cc0b810 1521 6cc0afd1-6cc0aff3 call 6cc0b400 1518->1521 1522 6cc0afcd-6cc0afcf 1518->1522 1526 6cc0b060-6cc0b079 call 6cc0b69a call 6cc0b810 1521->1526 1527 6cc0aff5-6cc0b038 call 6cc0b4cb call 6cc0b387 call 6cc0b7e3 call 6cc0b04d call 6cc0b66c call 6cc0b05a 1521->1527 1524 6cc0b03a-6cc0b049 1522->1524 1539 6cc0b08a-6cc0b091 1526->1539 1540 6cc0b07b-6cc0b081 1526->1540 1527->1524 1543 6cc0b093-6cc0b096 1539->1543 1544 6cc0b09d-6cc0b0b1 dllmain_raw 1539->1544 1540->1539 1542 6cc0b083-6cc0b085 1540->1542 1548 6cc0b163-6cc0b172 1542->1548 1543->1544 1549 6cc0b098-6cc0b09b 1543->1549 1545 6cc0b0b7-6cc0b0c8 dllmain_crt_dispatch 1544->1545 1546 6cc0b15a-6cc0b161 1544->1546 1545->1546 1550 6cc0b0ce-6cc0b0e0 call 6cc0aaa0 1545->1550 1546->1548 1549->1550 1556 6cc0b0e2-6cc0b0e4 1550->1556 1557 6cc0b109-6cc0b10b 1550->1557 1556->1557 1559 6cc0b0e6-6cc0b104 call 6cc0aaa0 call 6cc0afb8 dllmain_raw 1556->1559 1560 6cc0b112-6cc0b123 dllmain_crt_dispatch 1557->1560 1561 6cc0b10d-6cc0b110 1557->1561 1559->1557 1560->1546 1563 6cc0b125-6cc0b157 dllmain_raw 1560->1563 1561->1546 1561->1560 1563->1546
                            APIs
                            • __RTC_Initialize.LIBCMT ref: 6CC0AFFF
                            • ___scrt_uninitialize_crt.LIBCMT ref: 6CC0B019
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: Initialize___scrt_uninitialize_crt
                            • String ID:
                            • API String ID: 2442719207-0
                            • Opcode ID: 6873a07aa22ad82c138268969c6b355e45bcb0f5096199bf127f3a3e054ec9ae
                            • Instruction ID: 491e0729ec49783fe5519b6fb2ec2f6af67afe58fec61f8372d01e51271b420b
                            • Opcode Fuzzy Hash: 6873a07aa22ad82c138268969c6b355e45bcb0f5096199bf127f3a3e054ec9ae
                            • Instruction Fuzzy Hash: 1E41E572F05219EBCB10CF66CD50BEE7778EF80BA8F114115E82597B50F7328A469BA4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1568 6cc0b068-6cc0b079 call 6cc0b810 1571 6cc0b08a-6cc0b091 1568->1571 1572 6cc0b07b-6cc0b081 1568->1572 1574 6cc0b093-6cc0b096 1571->1574 1575 6cc0b09d-6cc0b0b1 dllmain_raw 1571->1575 1572->1571 1573 6cc0b083-6cc0b085 1572->1573 1578 6cc0b163-6cc0b172 1573->1578 1574->1575 1579 6cc0b098-6cc0b09b 1574->1579 1576 6cc0b0b7-6cc0b0c8 dllmain_crt_dispatch 1575->1576 1577 6cc0b15a-6cc0b161 1575->1577 1576->1577 1580 6cc0b0ce-6cc0b0e0 call 6cc0aaa0 1576->1580 1577->1578 1579->1580 1583 6cc0b0e2-6cc0b0e4 1580->1583 1584 6cc0b109-6cc0b10b 1580->1584 1583->1584 1585 6cc0b0e6-6cc0b104 call 6cc0aaa0 call 6cc0afb8 dllmain_raw 1583->1585 1586 6cc0b112-6cc0b123 dllmain_crt_dispatch 1584->1586 1587 6cc0b10d-6cc0b110 1584->1587 1585->1584 1586->1577 1589 6cc0b125-6cc0b157 dllmain_raw 1586->1589 1587->1577 1587->1586 1589->1577
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: dllmain_raw$dllmain_crt_dispatch
                            • String ID:
                            • API String ID: 3136044242-0
                            • Opcode ID: d34f4e527dddcdb7b2b775e8c525026f236227a36b56a2bc7006c83408acdab9
                            • Instruction ID: 01c61f9e8175e1a3b5f738f1e22ad85acc8dab613d1761525e517d808b9c6c4b
                            • Opcode Fuzzy Hash: d34f4e527dddcdb7b2b775e8c525026f236227a36b56a2bc7006c83408acdab9
                            • Instruction Fuzzy Hash: 59217171F41115EBCB21CF56CD50AAF3A79EB80B98F114115F82597B51E7328D429BE0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1594 6cc0aeb1-6cc0aebf call 6cc0b810 call 6cc0b4fb 1598 6cc0aec4-6cc0aec7 1594->1598 1599 6cc0aecd-6cc0aee5 call 6cc0b400 1598->1599 1600 6cc0af9e 1598->1600 1604 6cc0afb0-6cc0afb7 call 6cc0b69a 1599->1604 1605 6cc0aeeb-6cc0aefc call 6cc0b45d 1599->1605 1602 6cc0afa0-6cc0afaf 1600->1602 1610 6cc0af4b-6cc0af59 call 6cc0af94 1605->1610 1611 6cc0aefe-6cc0af20 call 6cc0b7b7 call 6cc0b37b call 6cc0b39f call 6cc0de77 1605->1611 1610->1600 1616 6cc0af5b-6cc0af65 call 6cc0b694 1610->1616 1611->1610 1630 6cc0af22-6cc0af29 call 6cc0b432 1611->1630 1622 6cc0af86-6cc0af8f 1616->1622 1623 6cc0af67-6cc0af70 call 6cc0b5bb 1616->1623 1622->1602 1623->1622 1629 6cc0af72-6cc0af84 1623->1629 1629->1622 1630->1610 1634 6cc0af2b-6cc0af48 call 6cc0de4c 1630->1634 1634->1610
                            APIs
                            • __RTC_Initialize.LIBCMT ref: 6CC0AEFE
                              • Part of subcall function 6CC0B37B: InitializeSListHead.KERNEL32(6CC69420,6CC0AF08,6CC1C650,00000010,6CC0AE99,?,?,?,6CC0B0C1,?,00000001,?,?,00000001,?,6CC1C698), ref: 6CC0B380
                            • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CC0AF68
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                            • String ID:
                            • API String ID: 3231365870-0
                            • Opcode ID: 07b649b9b3424987e913a4bf9eacf87eb439539bf3302fa0b50d538cbc79acc4
                            • Instruction ID: 15a8b815241396dffc555a206463ea28f62e39b6b2b4af5e504caa1da92df575
                            • Opcode Fuzzy Hash: 07b649b9b3424987e913a4bf9eacf87eb439539bf3302fa0b50d538cbc79acc4
                            • Instruction Fuzzy Hash: 3D210F717492019ECB05EBB6C8207ED37709F8222CF200859D894A7FC1FF238249D675

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1637 6cc114dc-6cc114e1 1638 6cc114e3-6cc114fb 1637->1638 1639 6cc11509-6cc11512 1638->1639 1640 6cc114fd-6cc11501 1638->1640 1642 6cc11524 1639->1642 1643 6cc11514-6cc11517 1639->1643 1640->1639 1641 6cc11503-6cc11507 1640->1641 1644 6cc1157e-6cc11582 1641->1644 1647 6cc11526-6cc11533 GetStdHandle 1642->1647 1645 6cc11520-6cc11522 1643->1645 1646 6cc11519-6cc1151e 1643->1646 1644->1638 1648 6cc11588-6cc1158b 1644->1648 1645->1647 1646->1647 1649 6cc11560-6cc11572 1647->1649 1650 6cc11535-6cc11537 1647->1650 1649->1644 1652 6cc11574-6cc11577 1649->1652 1650->1649 1651 6cc11539-6cc11542 GetFileType 1650->1651 1651->1649 1653 6cc11544-6cc1154d 1651->1653 1652->1644 1654 6cc11555-6cc11558 1653->1654 1655 6cc1154f-6cc11553 1653->1655 1654->1644 1656 6cc1155a-6cc1155e 1654->1656 1655->1644 1656->1644
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 6CC11528
                            • GetFileType.KERNELBASE(00000000), ref: 6CC1153A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileHandleType
                            • String ID:
                            • API String ID: 3000768030-0
                            • Opcode ID: 3f8a62c8c4e4d78e83cf1b41f8dd1f5e50d6ef3689bab36d46a2e832b542a2f1
                            • Instruction ID: 4e5a08f3430387b475f34a89c4e66a85882d48fd43be638b2e3d8f2b18827345
                            • Opcode Fuzzy Hash: 3f8a62c8c4e4d78e83cf1b41f8dd1f5e50d6ef3689bab36d46a2e832b542a2f1
                            • Instruction Fuzzy Hash: E111727160C7518AC7308E7F8C856127AA4A767274B341719D4B786DF1F238D586F251

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1657 6cc11e9a-6cc11ea6 1658 6cc11ed8-6cc11ee3 call 6cc0f914 1657->1658 1659 6cc11ea8-6cc11eaa 1657->1659 1666 6cc11ee5-6cc11ee7 1658->1666 1660 6cc11ec3-6cc11ed4 RtlAllocateHeap 1659->1660 1661 6cc11eac-6cc11ead 1659->1661 1663 6cc11ed6 1660->1663 1664 6cc11eaf-6cc11eb6 call 6cc12538 1660->1664 1661->1660 1663->1666 1664->1658 1669 6cc11eb8-6cc11ec1 call 6cc116c0 1664->1669 1669->1658 1669->1660
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,6CC107E7,6CC11BB4,?,6CC107E7,00000220,?,?,6CC11BB4), ref: 6CC11ECC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 14b5ab7405dca47f119ac4147f8e9ef9490e3c7f2877bd4e24c01fa47403a0df
                            • Instruction ID: 246ffb34cadd75eb95d2754d4c9c6fe9b6d44a3d8285857b8e7fbb324b9b1d6c
                            • Opcode Fuzzy Hash: 14b5ab7405dca47f119ac4147f8e9ef9490e3c7f2877bd4e24c01fa47403a0df
                            • Instruction Fuzzy Hash: CFE0E52224D2145AEF111AEF9C0CF8B369CAF233A5F110124EC1892E80FB28C400A2A5
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6CC0B6A6
                            • IsDebuggerPresent.KERNEL32 ref: 6CC0B772
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CC0B78B
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 6CC0B795
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                            • String ID:
                            • API String ID: 254469556-0
                            • Opcode ID: 7966c730fc5706b823221c8ceb857e8656a2b0362726a0f73ddb7f2162697afc
                            • Instruction ID: 54535094615043772ea81fbaa703475fff55a21b4f487149480c7399e9d9d809
                            • Opcode Fuzzy Hash: 7966c730fc5706b823221c8ceb857e8656a2b0362726a0f73ddb7f2162697afc
                            • Instruction Fuzzy Hash: F1311475E01318DBDF21DFA5C989BCDBBB8AF08304F1041AAE40DAB240EB719B858F54
                            APIs
                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CC0F72F
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CC0F739
                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CC0F746
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: 1de2840e2621ba630077f679a512961417da5aa603b0534c3944207b548a8ed4
                            • Instruction ID: 2798ff2e8902c7fe2d8243af9ae61c84e62a8e986c2575f80d3fa73c2a64e332
                            • Opcode Fuzzy Hash: 1de2840e2621ba630077f679a512961417da5aa603b0534c3944207b548a8ed4
                            • Instruction Fuzzy Hash: 0431E474A0132C9BCB61DF69D988BCDBBB8BF48314F5041EAE41CA7290E7319B858F55
                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CC16280,?,?,00000008,?,?,6CC15E83,00000000), ref: 6CC164B2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: f16d7a4085304eeb9e3a00ea59a333aeb28ee057cd7ffc8c36209333b17a2762
                            • Instruction ID: ef90cc882dfac188f70a7c0531dabdd840e4b8a9b1fc2923c57d00cfc72d14b7
                            • Opcode Fuzzy Hash: f16d7a4085304eeb9e3a00ea59a333aeb28ee057cd7ffc8c36209333b17a2762
                            • Instruction Fuzzy Hash: 03B16E31214A08DFD705CF2AC486B947BE0FF45368F258658E8E9CFAA1D335E992DB40
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CC0B86E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor
                            • String ID:
                            • API String ID: 2325560087-0
                            • Opcode ID: ddf0fbe4406282680f05ff3bd2c4d042674f726c2b874084bbb7f15b1262d7bc
                            • Instruction ID: 38510df00fe8259fdb49f813dc9277346a08f44b1020a2b03822eb597c35f482
                            • Opcode Fuzzy Hash: ddf0fbe4406282680f05ff3bd2c4d042674f726c2b874084bbb7f15b1262d7bc
                            • Instruction Fuzzy Hash: F85149B1B11A098BEB04CF5AC5917BABBF4FB49318F20856AD515EBB80E3759940CB50
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: HeapProcess
                            • String ID:
                            • API String ID: 54951025-0
                            • Opcode ID: 68a1a9088f134e56b2c0195e9becc1a3a1beb3bc01be7d7e91bf0eaaf279968a
                            • Instruction ID: 5d6416000e3a03fa7d4b860c49d9b5eaf66cab1f60e327c8fc50adb548216e3f
                            • Opcode Fuzzy Hash: 68a1a9088f134e56b2c0195e9becc1a3a1beb3bc01be7d7e91bf0eaaf279968a
                            • Instruction Fuzzy Hash: B3A001707452018BAF508F3B870A2197AF9AA4BAA1B1984A9A809C9655EA248450AF12
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmp, Offset: 6CC1E000, based on PE: true
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 161b052c6f8f28aa8eb581e2d29508f1625a35a28dfff6ea84b9b1789e712dd4
                            • Instruction ID: 596368332bef1a09cc0c47e4a3ef8969573fd54da00a3f44100438afaf40d41d
                            • Opcode Fuzzy Hash: 161b052c6f8f28aa8eb581e2d29508f1625a35a28dfff6ea84b9b1789e712dd4
                            • Instruction Fuzzy Hash: D462442144E3C29FD7138B749C746E27FB4AE5721471E09DBD8C08F4A3E2291A6AD772

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1764 6cc0d0ca-6cc0d0f5 call 6cc0dc99 1767 6cc0d469-6cc0d46e call 6cc0ec19 1764->1767 1768 6cc0d0fb-6cc0d0fe 1764->1768 1768->1767 1769 6cc0d104-6cc0d10d 1768->1769 1771 6cc0d113-6cc0d117 1769->1771 1772 6cc0d20a-6cc0d210 1769->1772 1771->1772 1774 6cc0d11d-6cc0d124 1771->1774 1775 6cc0d218-6cc0d226 1772->1775 1776 6cc0d126-6cc0d12d 1774->1776 1777 6cc0d13c-6cc0d141 1774->1777 1778 6cc0d3d2-6cc0d3d5 1775->1778 1779 6cc0d22c-6cc0d230 1775->1779 1776->1777 1780 6cc0d12f-6cc0d136 1776->1780 1777->1772 1781 6cc0d147-6cc0d14f call 6cc0c70e 1777->1781 1782 6cc0d3d7-6cc0d3da 1778->1782 1783 6cc0d3f8-6cc0d401 call 6cc0c70e 1778->1783 1779->1778 1784 6cc0d236-6cc0d23d 1779->1784 1780->1772 1780->1777 1797 6cc0d403-6cc0d407 1781->1797 1800 6cc0d155-6cc0d16e call 6cc0c70e * 2 1781->1800 1782->1767 1786 6cc0d3e0-6cc0d3f5 call 6cc0d46f 1782->1786 1783->1767 1783->1797 1787 6cc0d255-6cc0d25b 1784->1787 1788 6cc0d23f-6cc0d246 1784->1788 1786->1783 1790 6cc0d261-6cc0d288 call 6cc0c8a3 1787->1790 1791 6cc0d372-6cc0d376 1787->1791 1788->1787 1795 6cc0d248-6cc0d24f 1788->1795 1790->1791 1806 6cc0d28e-6cc0d291 1790->1806 1798 6cc0d382-6cc0d38e 1791->1798 1799 6cc0d378-6cc0d381 call 6cc0c37e 1791->1799 1795->1778 1795->1787 1798->1783 1804 6cc0d390-6cc0d39a 1798->1804 1799->1798 1800->1767 1823 6cc0d174-6cc0d17a 1800->1823 1808 6cc0d3a8-6cc0d3aa 1804->1808 1809 6cc0d39c-6cc0d39e 1804->1809 1814 6cc0d294-6cc0d2a9 1806->1814 1811 6cc0d3c1-6cc0d3ce call 6cc0db52 1808->1811 1812 6cc0d3ac-6cc0d3bf call 6cc0c70e * 2 1808->1812 1809->1783 1815 6cc0d3a0-6cc0d3a4 1809->1815 1831 6cc0d3d0 1811->1831 1832 6cc0d42d-6cc0d442 call 6cc0c70e * 2 1811->1832 1838 6cc0d408 call 6cc0eb5d 1812->1838 1818 6cc0d353-6cc0d366 1814->1818 1819 6cc0d2af-6cc0d2b2 1814->1819 1815->1783 1821 6cc0d3a6 1815->1821 1818->1814 1824 6cc0d36c-6cc0d36f 1818->1824 1819->1818 1825 6cc0d2b8-6cc0d2c0 1819->1825 1821->1812 1828 6cc0d1a6-6cc0d1ae call 6cc0c70e 1823->1828 1829 6cc0d17c-6cc0d180 1823->1829 1824->1791 1825->1818 1830 6cc0d2c6-6cc0d2da 1825->1830 1848 6cc0d1b0-6cc0d1d0 call 6cc0c70e * 2 call 6cc0db52 1828->1848 1849 6cc0d212-6cc0d215 1828->1849 1829->1828 1834 6cc0d182-6cc0d189 1829->1834 1835 6cc0d2dd-6cc0d2ee 1830->1835 1831->1783 1861 6cc0d444 1832->1861 1862 6cc0d447-6cc0d464 call 6cc0ca8f call 6cc0da52 call 6cc0dc0f call 6cc0d9c9 1832->1862 1839 6cc0d18b-6cc0d192 1834->1839 1840 6cc0d19d-6cc0d1a0 1834->1840 1841 6cc0d2f0-6cc0d301 call 6cc0d5a5 1835->1841 1842 6cc0d314-6cc0d321 1835->1842 1853 6cc0d40d-6cc0d428 call 6cc0c37e call 6cc0d759 call 6cc0dd46 1838->1853 1839->1840 1846 6cc0d194-6cc0d19b 1839->1846 1840->1767 1840->1828 1858 6cc0d303-6cc0d30c 1841->1858 1859 6cc0d325-6cc0d34d call 6cc0d04a 1841->1859 1842->1835 1851 6cc0d323 1842->1851 1846->1828 1846->1840 1848->1849 1878 6cc0d1d2-6cc0d1d7 1848->1878 1849->1775 1852 6cc0d350 1851->1852 1852->1818 1853->1832 1858->1841 1866 6cc0d30e-6cc0d311 1858->1866 1859->1852 1861->1862 1862->1767 1866->1842 1878->1838 1880 6cc0d1dd-6cc0d1f0 call 6cc0d7ae 1878->1880 1880->1853 1885 6cc0d1f6-6cc0d202 1880->1885 1885->1838 1886 6cc0d208 1885->1886 1886->1880
                            APIs
                            • type_info::operator==.LIBVCRUNTIME ref: 6CC0D1E9
                            • ___TypeMatch.LIBVCRUNTIME ref: 6CC0D2F7
                            • _UnwindNestedFrames.LIBCMT ref: 6CC0D449
                            • CallUnexpected.LIBVCRUNTIME ref: 6CC0D464
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                            • String ID: csm$csm$csm
                            • API String ID: 2751267872-393685449
                            • Opcode ID: cb3cf301d74cfecc71e02320870acdb131bd336829a08d67df6a36196752a853
                            • Instruction ID: 279eff788c29daf45e5b577c6c543f1209eb812e3532814976c706717f710bcc
                            • Opcode Fuzzy Hash: cb3cf301d74cfecc71e02320870acdb131bd336829a08d67df6a36196752a853
                            • Instruction Fuzzy Hash: 8DB1AE75E00209DFCF04DFA5C88099EBBB5FF04319F14465AE8116BA15E732EA55CFA2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1887 6cc0c170-6cc0c1c1 call 6cc16ad0 call 6cc0c130 call 6cc0c697 1894 6cc0c1c3-6cc0c1d5 1887->1894 1895 6cc0c21d-6cc0c220 1887->1895 1896 6cc0c240-6cc0c249 1894->1896 1898 6cc0c1d7-6cc0c1ee 1894->1898 1895->1896 1897 6cc0c222-6cc0c22f call 6cc0c680 1895->1897 1904 6cc0c234-6cc0c23d call 6cc0c130 1897->1904 1900 6cc0c1f0-6cc0c1fe call 6cc0c620 1898->1900 1901 6cc0c204 1898->1901 1908 6cc0c200 1900->1908 1909 6cc0c214-6cc0c21b 1900->1909 1903 6cc0c207-6cc0c20c 1901->1903 1903->1898 1906 6cc0c20e-6cc0c210 1903->1906 1904->1896 1906->1896 1910 6cc0c212 1906->1910 1912 6cc0c202 1908->1912 1913 6cc0c24a-6cc0c253 1908->1913 1909->1904 1910->1904 1912->1903 1914 6cc0c255-6cc0c25c 1913->1914 1915 6cc0c28d-6cc0c29d call 6cc0c660 1913->1915 1914->1915 1916 6cc0c25e-6cc0c26d call 6cc168a0 1914->1916 1921 6cc0c2b1-6cc0c2cd call 6cc0c130 call 6cc0c640 1915->1921 1922 6cc0c29f-6cc0c2ae call 6cc0c680 1915->1922 1924 6cc0c28a 1916->1924 1925 6cc0c26f-6cc0c287 1916->1925 1922->1921 1924->1915 1925->1924
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 6CC0C1A7
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 6CC0C1AF
                            • _ValidateLocalCookies.LIBCMT ref: 6CC0C238
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 6CC0C263
                            • _ValidateLocalCookies.LIBCMT ref: 6CC0C2B8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 1170836740-1018135373
                            • Opcode ID: 3fbce5662d9f7795f63455af9cd2a80c82b704d3cd45717027e42d9c24a92c1b
                            • Instruction ID: 716aa71e249c5c98dc4381bd1d28947ee3a0c250f2df17a56fde879b2a5c1cf3
                            • Opcode Fuzzy Hash: 3fbce5662d9f7795f63455af9cd2a80c82b704d3cd45717027e42d9c24a92c1b
                            • Instruction Fuzzy Hash: 78419534B011199BCF00EFA9C880A9E7BB5FF45318F148155E9249BF51E732D959CFA2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1933 6cc1103a-6cc11046 1934 6cc110d8-6cc110db 1933->1934 1935 6cc110e1 1934->1935 1936 6cc1104b-6cc1105c 1934->1936 1937 6cc110e3-6cc110e7 1935->1937 1938 6cc11069-6cc11082 LoadLibraryExW 1936->1938 1939 6cc1105e-6cc11061 1936->1939 1940 6cc11084-6cc1108d GetLastError 1938->1940 1941 6cc110e8-6cc110f8 1938->1941 1942 6cc11101-6cc11103 1939->1942 1943 6cc11067 1939->1943 1944 6cc110c6-6cc110d3 1940->1944 1945 6cc1108f-6cc110a1 call 6cc0ee93 1940->1945 1941->1942 1946 6cc110fa-6cc110fb FreeLibrary 1941->1946 1942->1937 1947 6cc110d5 1943->1947 1944->1947 1945->1944 1950 6cc110a3-6cc110b5 call 6cc0ee93 1945->1950 1946->1942 1947->1934 1950->1944 1953 6cc110b7-6cc110c4 LoadLibraryExW 1950->1953 1953->1941 1953->1944
                            APIs
                            • FreeLibrary.KERNEL32(00000000,?,6CC11149,00000000,6CC0E950,00000000,00000000,00000001,?,6CC112C2,00000022,FlsSetValue,6CC18898,6CC188A0,00000000), ref: 6CC110FB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: FreeLibrary
                            • String ID: api-ms-$ext-ms-
                            • API String ID: 3664257935-537541572
                            • Opcode ID: 53014073b5b6a6f1480dac90ca1ebef976ae8ca371baeef44c0c9cd611da9537
                            • Instruction ID: 2fd270f42c3330c7571b40b18717e186f3cc57fe2b1e6fa3167c2a4e3ca78ef4
                            • Opcode Fuzzy Hash: 53014073b5b6a6f1480dac90ca1ebef976ae8ca371baeef44c0c9cd611da9537
                            • Instruction Fuzzy Hash: B121EB35F09211AFCB218B6BCC40A8A77B8AB52364F250255E815A7E80F734EA06F7D0
                            APIs
                            • GetLastError.KERNEL32(00000001,?,6CC0C351,6CC0B470,6CC0AE89,?,6CC0B0C1,?,00000001,?,?,00000001,?,6CC1C698,0000000C,6CC0B1BA), ref: 6CC0C72A
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CC0C738
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CC0C751
                            • SetLastError.KERNEL32(00000000,6CC0B0C1,?,00000001,?,?,00000001,?,6CC1C698,0000000C,6CC0B1BA,?,00000001,?), ref: 6CC0C7A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: def639a02a88267ba2d24d7fe991c840916826d31e77d4ec12e73ba6d3eb4c73
                            • Instruction ID: 88ab3e3812005ee6f98a2d781a585726f41ff064780eed206e9c9185cc6c07d3
                            • Opcode Fuzzy Hash: def639a02a88267ba2d24d7fe991c840916826d31e77d4ec12e73ba6d3eb4c73
                            • Instruction Fuzzy Hash: 1F01D83230D3255EE704367B9D849562BB4EB0777D320032AE51491AD0FF534845A3A6
                            Strings
                            • C:\Users\user\Desktop\xFk6x2mrd7.exe, xrefs: 6CC1028A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: C:\Users\user\Desktop\xFk6x2mrd7.exe
                            • API String ID: 0-3240530527
                            • Opcode ID: 24de5d26c4e69050668f13d5512d34d13ab5bb657bb6d533ac5f7af2f31de6e0
                            • Instruction ID: 21574eada3569dca61fcde18e5ba2120c9c8916da195525556ebe37d735e3ec1
                            • Opcode Fuzzy Hash: 24de5d26c4e69050668f13d5512d34d13ab5bb657bb6d533ac5f7af2f31de6e0
                            • Instruction Fuzzy Hash: AD216F3120C2C5AFDB04DF77C89099B77A9FF053687448629E91897E40FB31E860EBA0
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,04D34F2F,00000000,?,00000000,6CC16B82,000000FF,?,6CC0E218,?,?,6CC0E1EC,?), ref: 6CC0E2B3
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CC0E2C5
                            • FreeLibrary.KERNEL32(00000000,?,00000000,6CC16B82,000000FF,?,6CC0E218,?,?,6CC0E1EC,?), ref: 6CC0E2E7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: a46cf0be965165137609d2446de852f4df779efd312f7942a360d063a9610d8a
                            • Instruction ID: 6a362d189182b8ddf50735d57fbf82c1c0d1e8f78557fe22ae09d0f1a41e33fe
                            • Opcode Fuzzy Hash: a46cf0be965165137609d2446de852f4df779efd312f7942a360d063a9610d8a
                            • Instruction Fuzzy Hash: 64018F31A08619EFDF019F52CC05FAE7BB9FB05714F01452AE821A2E80EB359900DBD0
                            APIs
                            • __alloca_probe_16.LIBCMT ref: 6CC12D7A
                            • __alloca_probe_16.LIBCMT ref: 6CC12E43
                            • __freea.LIBCMT ref: 6CC12EAA
                              • Part of subcall function 6CC11E9A: RtlAllocateHeap.NTDLL(00000000,6CC107E7,6CC11BB4,?,6CC107E7,00000220,?,?,6CC11BB4), ref: 6CC11ECC
                            • __freea.LIBCMT ref: 6CC12EBD
                            • __freea.LIBCMT ref: 6CC12ECA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: __freea$__alloca_probe_16$AllocateHeap
                            • String ID:
                            • API String ID: 1423051803-0
                            • Opcode ID: 83bf94459dd6f045c71286b67672251be6f53d11f19d96aab79ed4a3ab29cc22
                            • Instruction ID: 6bb44c22a6336abaa9cb0ab14e70fe12b4186ab841179ff4243188342f252f99
                            • Opcode Fuzzy Hash: 83bf94459dd6f045c71286b67672251be6f53d11f19d96aab79ed4a3ab29cc22
                            • Instruction Fuzzy Hash: 4B51E676608246AFEB158FA7CC58EEB36ADEF46719B114128FD14D6E40F734CC60E660
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6CC0CCA3,00000000,?,00000001,?,?,?,6CC0CD92,00000001,FlsFree,6CC17F70,FlsFree), ref: 6CC0CCFF
                            • GetLastError.KERNEL32(?,6CC0CCA3,00000000,?,00000001,?,?,?,6CC0CD92,00000001,FlsFree,6CC17F70,FlsFree,00000000,?,6CC0C7F1), ref: 6CC0CD09
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6CC0CD31
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID: api-ms-
                            • API String ID: 3177248105-2084034818
                            • Opcode ID: 6d4dcac3eef13aa0d45a20b8d661d4dc0175ecb49f6a44db40958a466f5deaa6
                            • Instruction ID: 4d1df35fa21755f78a4f84e43e93285804b881c20c1c81c956d7b2feedd2cc31
                            • Opcode Fuzzy Hash: 6d4dcac3eef13aa0d45a20b8d661d4dc0175ecb49f6a44db40958a466f5deaa6
                            • Instruction Fuzzy Hash: E5E04F34388308BBEF002F62DC06B4A3E75BB01B44F104461F91DA8CD1F7B29511E6A6
                            APIs
                            • GetConsoleOutputCP.KERNEL32(04D34F2F,00000000,00000000,?), ref: 6CC13465
                              • Part of subcall function 6CC10E3C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CC12EA0,?,00000000,-00000008), ref: 6CC10E9D
                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CC136B7
                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CC136FD
                            • GetLastError.KERNEL32 ref: 6CC137A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                            • String ID:
                            • API String ID: 2112829910-0
                            • Opcode ID: 6dc6d157ce82a6a46c034d82b22cd743223e41eca73d6de26ffddc8b223fe778
                            • Instruction ID: c754264717e2cce3b6485aaa8b28f8a0bf8d75d9a40ee20942520fe075fc7121
                            • Opcode Fuzzy Hash: 6dc6d157ce82a6a46c034d82b22cd743223e41eca73d6de26ffddc8b223fe778
                            • Instruction Fuzzy Hash: EAD17DB5E04248AFCF05CFAAC9809EDBBB5FF09318F18456AE415EBB41E730A941DB50
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: AdjustPointer
                            • String ID:
                            • API String ID: 1740715915-0
                            • Opcode ID: c123748cfe9d0ce9badb30f4933847edc3106d2aa74b10d884807b9f3562dea5
                            • Instruction ID: b2041f5e6e707ba946ed18befa8cf1b518608d0e886094787e2037ea1ddcd3e2
                            • Opcode Fuzzy Hash: c123748cfe9d0ce9badb30f4933847edc3106d2aa74b10d884807b9f3562dea5
                            • Instruction Fuzzy Hash: 6651C2B2706606AFEB15AF55D440BAAB7B4FF05318F20452DE81547E90F733E884CBA2
                            APIs
                              • Part of subcall function 6CC10E3C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CC12EA0,?,00000000,-00000008), ref: 6CC10E9D
                            • GetLastError.KERNEL32 ref: 6CC0FAEC
                            • __dosmaperr.LIBCMT ref: 6CC0FAF3
                            • GetLastError.KERNEL32(?,?,?,?), ref: 6CC0FB2D
                            • __dosmaperr.LIBCMT ref: 6CC0FB34
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                            • String ID:
                            • API String ID: 1913693674-0
                            • Opcode ID: 75e60f303789a4e4fc3b29af46d728d35dca0c704d6c435d5685a605983f1d21
                            • Instruction ID: bd649e115b3bbda35207de4fd5a0dff4fb34bf17ae8867abfff602ecbe053d30
                            • Opcode Fuzzy Hash: 75e60f303789a4e4fc3b29af46d728d35dca0c704d6c435d5685a605983f1d21
                            • Instruction Fuzzy Hash: F821AC31704205AF9B109F6B88909ABB7BDFF053687148629E85987E00F736EC948BA4
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 6CC10EE7
                              • Part of subcall function 6CC10E3C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CC12EA0,?,00000000,-00000008), ref: 6CC10E9D
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CC10F1F
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CC10F3F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                            • String ID:
                            • API String ID: 158306478-0
                            • Opcode ID: 8a6f280bdeececa41c4e96960466e930c228979d52d6018c782a7371fdef7e7d
                            • Instruction ID: 779dfd3384d31379991a9545c451a60fb1d569ae512580f545c2fe8da7eb208b
                            • Opcode Fuzzy Hash: 8a6f280bdeececa41c4e96960466e930c228979d52d6018c782a7371fdef7e7d
                            • Instruction Fuzzy Hash: 7311C4B160D6597EAB0117B78D8ECEF6A7CEF8A2AD7140514F805D1E00FB30DD16A6B1
                            APIs
                            • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CC14536,00000000,00000001,00000000,?,?,6CC137F4,?,00000000,00000000), ref: 6CC14D8D
                            • GetLastError.KERNEL32(?,6CC14536,00000000,00000001,00000000,?,?,6CC137F4,?,00000000,00000000,?,?,?,6CC13D97,00000000), ref: 6CC14D99
                              • Part of subcall function 6CC14D5F: CloseHandle.KERNEL32(FFFFFFFE,6CC14DA9,?,6CC14536,00000000,00000001,00000000,?,?,6CC137F4,?,00000000,00000000,?,?), ref: 6CC14D6F
                            • ___initconout.LIBCMT ref: 6CC14DA9
                              • Part of subcall function 6CC14D21: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CC14D50,6CC14523,?,?,6CC137F4,?,00000000,00000000,?), ref: 6CC14D34
                            • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CC14536,00000000,00000001,00000000,?,?,6CC137F4,?,00000000,00000000,?), ref: 6CC14DBE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                            • String ID:
                            • API String ID: 2744216297-0
                            • Opcode ID: 2432f17d0f488de37e67f681c17dd43fa88e1bfc93079a9252ebb3cb87aa470c
                            • Instruction ID: 253dbaac0becd43d728ac5072cf9a7ad520229991c756e0ac00f0d0e3357e63d
                            • Opcode Fuzzy Hash: 2432f17d0f488de37e67f681c17dd43fa88e1bfc93079a9252ebb3cb87aa470c
                            • Instruction Fuzzy Hash: E5F01C36214118BBCF12AFE3CC08A893F76FB0A3B5B054194FA1C85D20D6328821FB90
                            APIs
                            • EncodePointer.KERNEL32(00000000,?), ref: 6CC0D494
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1680031775.000000006CC01000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CC00000, based on PE: true
                            • Associated: 00000000.00000002.1680010952.000000006CC00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680060715.000000006CC17000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680080069.000000006CC1E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.1680141425.000000006CC6A000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6cc00000_xFk6x2mrd7.jbxd
                            Yara matches
                            Similarity
                            • API ID: EncodePointer
                            • String ID: MOC$RCC
                            • API String ID: 2118026453-2084237596
                            • Opcode ID: 9f20972818f41d3fc66c051fcbb792ae841340e1b2ae37d1c811ab210e60820c
                            • Instruction ID: 34783f143bfb8e1e682116930edc3e1e5dbdb072646042b44f26c3ae392d9f6e
                            • Opcode Fuzzy Hash: 9f20972818f41d3fc66c051fcbb792ae841340e1b2ae37d1c811ab210e60820c
                            • Instruction Fuzzy Hash: BD413BB1A00209AFCF05CF94CC80AEEBBB5FF48308F248159F915A7651E336E951DB51

                            Execution Graph

                            Execution Coverage:17%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:179
                            Total number of Limit Nodes:11
                            execution_graph 49300 85d300 DuplicateHandle 49301 85d396 49300->49301 49366 59942b0 49367 59942bb 49366->49367 49369 59942cb 49367->49369 49370 59935b8 49367->49370 49371 5994300 OleInitialize 49370->49371 49372 5994364 49371->49372 49372->49369 49373 49b1cf0 49374 49b1d58 CreateWindowExW 49373->49374 49376 49b1e14 49374->49376 49302 80d01c 49303 80d034 49302->49303 49304 80d08e 49303->49304 49309 49b1e98 49303->49309 49313 49b0ad4 49303->49313 49322 49b2c08 49303->49322 49331 49b1ea8 49303->49331 49310 49b1ece 49309->49310 49311 49b0ad4 CallWindowProcW 49310->49311 49312 49b1eef 49311->49312 49312->49304 49314 49b0adf 49313->49314 49315 49b2c79 49314->49315 49317 49b2c69 49314->49317 49351 49b0bfc 49315->49351 49335 49b2e6c 49317->49335 49341 49b2da0 49317->49341 49346 49b2d90 49317->49346 49318 49b2c77 49325 49b2c45 49322->49325 49323 49b2c79 49324 49b0bfc CallWindowProcW 49323->49324 49327 49b2c77 49324->49327 49325->49323 49326 49b2c69 49325->49326 49328 49b2e6c CallWindowProcW 49326->49328 49329 49b2d90 CallWindowProcW 49326->49329 49330 49b2da0 CallWindowProcW 49326->49330 49328->49327 49329->49327 49330->49327 49332 49b1ece 49331->49332 49333 49b0ad4 CallWindowProcW 49332->49333 49334 49b1eef 49333->49334 49334->49304 49336 49b2e2a 49335->49336 49337 49b2e7a 49335->49337 49355 49b2e58 49336->49355 49358 49b2e48 49336->49358 49338 49b2e40 49338->49318 49343 49b2db4 49341->49343 49342 49b2e40 49342->49318 49344 49b2e58 CallWindowProcW 49343->49344 49345 49b2e48 CallWindowProcW 49343->49345 49344->49342 49345->49342 49347 49b2da0 49346->49347 49349 49b2e58 CallWindowProcW 49347->49349 49350 49b2e48 CallWindowProcW 49347->49350 49348 49b2e40 49348->49318 49349->49348 49350->49348 49352 49b0c07 49351->49352 49353 49b4309 49352->49353 49354 49b435a CallWindowProcW 49352->49354 49353->49318 49354->49353 49356 49b2e69 49355->49356 49362 49b4292 49355->49362 49356->49338 49359 49b2e58 49358->49359 49360 49b2e69 49359->49360 49361 49b4292 CallWindowProcW 49359->49361 49360->49338 49361->49360 49363 49b4299 49362->49363 49364 49b0bfc CallWindowProcW 49363->49364 49365 49b42aa 49364->49365 49365->49356 49377 854668 49378 854684 49377->49378 49379 854696 49378->49379 49383 8547a0 49378->49383 49388 853e10 49379->49388 49381 8546b5 49384 8547c5 49383->49384 49393 8548a1 49384->49393 49397 8548b0 49384->49397 49389 853e1b 49388->49389 49390 856ff8 49389->49390 49405 49b6948 49389->49405 49410 49b6938 49389->49410 49390->49381 49394 8548d7 49393->49394 49395 8549b4 49394->49395 49401 854248 49394->49401 49395->49395 49399 8548d7 49397->49399 49398 8549b4 49398->49398 49399->49398 49400 854248 CreateActCtxA 49399->49400 49400->49398 49402 855940 CreateActCtxA 49401->49402 49404 855a03 49402->49404 49404->49404 49406 49b696b 49405->49406 49407 49b6e5d 49406->49407 49415 5991690 49406->49415 49420 59916a0 49406->49420 49411 49b6941 49410->49411 49412 49b6e5d 49411->49412 49413 5991690 3 API calls 49411->49413 49414 59916a0 3 API calls 49411->49414 49413->49411 49414->49411 49416 59916a0 49415->49416 49425 59916f1 49416->49425 49430 5991ab0 49416->49430 49417 59916d6 49417->49406 49421 59916ba 49420->49421 49423 59916f1 3 API calls 49421->49423 49424 5991ab0 3 API calls 49421->49424 49422 59916d6 49422->49406 49423->49422 49424->49422 49429 599172d 49425->49429 49426 5991ae6 49426->49417 49429->49426 49435 599414f 49429->49435 49442 5994160 49429->49442 49434 5991a7e 49430->49434 49431 5991ae6 49431->49417 49432 599414f 3 API calls 49432->49434 49433 5994160 3 API calls 49433->49434 49434->49431 49434->49432 49434->49433 49436 5994160 49435->49436 49449 59941f0 49436->49449 49437 5994199 49453 59943c8 49437->49453 49461 599444a 49437->49461 49438 59941d0 49438->49429 49443 5994187 49442->49443 49446 59941f0 GetKeyboardLayout 49443->49446 49444 5994199 49447 59943c8 2 API calls 49444->49447 49448 599444a 2 API calls 49444->49448 49445 59941d0 49445->49429 49446->49444 49447->49445 49448->49445 49450 5994239 49449->49450 49451 599424c GetKeyboardLayout 49450->49451 49452 5994279 49451->49452 49452->49437 49454 59943f4 49453->49454 49469 5994598 49454->49469 49473 59945a8 49454->49473 49455 59944be 49459 5994598 LdrInitializeThunk 49455->49459 49460 59945a8 LdrInitializeThunk 49455->49460 49456 5994526 49456->49438 49459->49456 49460->49456 49462 599445d 49461->49462 49465 5994598 LdrInitializeThunk 49462->49465 49466 59945a8 LdrInitializeThunk 49462->49466 49463 59944be 49467 5994598 LdrInitializeThunk 49463->49467 49468 59945a8 LdrInitializeThunk 49463->49468 49464 5994526 49464->49438 49465->49463 49466->49463 49467->49464 49468->49464 49470 59945a8 49469->49470 49471 5994607 LdrInitializeThunk 49470->49471 49472 59945ff 49470->49472 49471->49472 49472->49455 49474 59945cf 49473->49474 49475 5994607 LdrInitializeThunk 49474->49475 49476 59945ff 49474->49476 49475->49476 49476->49455 49477 85d0b8 49478 85d0fe GetCurrentProcess 49477->49478 49480 85d150 GetCurrentThread 49478->49480 49481 85d149 49478->49481 49482 85d186 49480->49482 49483 85d18d GetCurrentProcess 49480->49483 49481->49480 49482->49483 49486 85d1c3 49483->49486 49484 85d1eb GetCurrentThreadId 49485 85d21c 49484->49485 49486->49484 49487 85ad38 49488 85ad47 49487->49488 49491 85ae20 49487->49491 49499 85ae30 49487->49499 49492 85ae41 49491->49492 49493 85ae64 49491->49493 49492->49493 49507 85b0b8 49492->49507 49511 85b0c8 49492->49511 49493->49488 49494 85ae5c 49494->49493 49495 85b068 GetModuleHandleW 49494->49495 49496 85b095 49495->49496 49496->49488 49500 85ae41 49499->49500 49501 85ae64 49499->49501 49500->49501 49505 85b0b8 LoadLibraryExW 49500->49505 49506 85b0c8 LoadLibraryExW 49500->49506 49501->49488 49502 85ae5c 49502->49501 49503 85b068 GetModuleHandleW 49502->49503 49504 85b095 49503->49504 49504->49488 49505->49502 49506->49502 49508 85b0dc 49507->49508 49509 85b101 49508->49509 49515 85a870 49508->49515 49509->49494 49512 85b0dc 49511->49512 49513 85a870 LoadLibraryExW 49512->49513 49514 85b101 49512->49514 49513->49514 49514->49494 49517 85b2a8 LoadLibraryExW 49515->49517 49518 85b321 49517->49518 49518->49509

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 294 59aea18-59aea24 295 59aea96-59aea9f 294->295 296 59aea26-59aea2a 294->296 297 59aeaa8-59aeadd 295->297 298 59aeaa1-59aeaa6 295->298 299 59aea30-59aea36 296->299 300 59aeae4-59aeaed 296->300 297->300 298->297 303 59aea38-59aea3b 299->303 304 59aea3d 299->304 301 59aeaef-59aeaf4 300->301 302 59aeaf6-59aeb60 300->302 301->302 324 59aeb62 302->324 325 59aeb90-59aeb95 302->325 306 59aea40-59aea44 303->306 304->306 310 59aea5a-59aea5f 306->310 311 59aea46-59aea54 306->311 312 59aea6f-59aea77 310->312 313 59aea61-59aea67 310->313 311->310 498 59aea79 call 59aea0a 312->498 499 59aea79 call 59aeb38 312->499 500 59aea79 call 59aea18 312->500 313->312 317 59aea7f-59aea83 319 59aea8f-59aea93 317->319 320 59aea85-59aea89 317->320 320->319 326 59aeb65-59aeb78 324->326 327 59aeb7a-59aeb82 326->327 328 59aeb98-59aebce 326->328 329 59aeb8a-59aeb8e 327->329 331 59aef3c-59aef45 328->331 332 59aebd4-59aebd8 328->332 329->325 329->326 333 59aef4e-59aef69 331->333 334 59aef47-59aef4c 331->334 335 59aebde-59aebf0 332->335 336 59aef70-59aefda 332->336 333->336 334->333 341 59aecdd-59aece6 335->341 342 59aebf6-59aec3f 335->342 363 59aefdc-59aefe2 336->363 364 59aefe4-59aefe7 336->364 344 59aecfa-59aed04 341->344 345 59aece8-59aecf2 341->345 366 59aec53-59aec5d 342->366 367 59aec41-59aec4b 342->367 348 59aed2c-59aed3d 344->348 349 59aed06-59aed24 344->349 345->344 355 59aed3f-59aed45 348->355 356 59aed4d-59aed68 348->356 349->348 355->356 491 59aed6a call 59aea0a 356->491 492 59aed6a call 59aefb8 356->492 493 59aed6a call 59aeb38 356->493 494 59aed6a call 59aea18 356->494 495 59aed6a call 59af4e8 356->495 496 59aed6a call 59af1c6 356->496 497 59aed6a call 59af417 356->497 368 59aefea-59aeff1 363->368 364->368 365 59aed70-59aef39 372 59aec5f-59aec7d 366->372 373 59aec85-59aec96 366->373 367->366 370 59aeffd-59af016 368->370 371 59aeff3-59aeffa 368->371 378 59af018-59af031 370->378 379 59af034-59af040 370->379 372->373 380 59aec98-59aec9e 373->380 381 59aeca6-59aecd8 373->381 378->379 383 59af40d-59af411 379->383 384 59af046-59af083 call 59a2860 379->384 380->381 381->365 386 59af478-59af47f 383->386 387 59af413-59af415 383->387 415 59af089-59af094 384->415 416 59af2e0-59af2e7 384->416 390 59af4d3-59af4da 386->390 391 59af481-59af4a4 386->391 392 59af470-59af476 387->392 408 59af4b2 391->408 409 59af4a6-59af4b0 391->409 392->386 394 59af420-59af426 392->394 398 59af42c-59af43b 394->398 399 59af4dd-59af51b 394->399 410 59af46f 398->410 411 59af43d-59af467 398->411 406 59af52b-59af534 399->406 407 59af51d-59af529 399->407 413 59af537-59af53b 406->413 407->413 414 59af4bc-59af4cc 408->414 409->414 410->392 411->410 417 59af53d-59af55f 413->417 418 59af562-59af56e 413->418 414->390 430 59af0e2-59af112 415->430 431 59af096-59af09d 415->431 421 59af3fb-59af407 416->421 422 59af2ed-59af353 416->422 428 59af57c-59af597 call 59ac9c0 418->428 429 59af570-59af579 418->429 421->383 421->384 470 59af3cb-59af3f8 422->470 471 59af355-59af35c 422->471 446 59af599-59af59f 428->446 447 59af5a1 428->447 444 59af118-59af19b call 59a2860 * 3 430->444 445 59af19d-59af1b6 430->445 434 59af0cb-59af0de 431->434 435 59af09f-59af0c3 431->435 434->430 435->434 451 59af1b8-59af1c3 444->451 445->451 452 59af5a3-59af5b6 446->452 447->452 451->416 501 59af5b9 call 59af618 452->501 502 59af5b9 call 59af610 452->502 456 59af5bc-59af5e3 call 59ad560 465 59af5ee 456->465 466 59af5e5 456->466 466->465 470->421 471->470 473 59af35e-59af3c9 call 59a2860 * 3 471->473 473->470 491->365 492->365 493->365 494->365 495->365 496->365 497->365 498->317 499->317 500->317 501->456 502->456
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq$(bq$(bq$0os$Dqs$Ljs
                            • API String ID: 0-3974489700
                            • Opcode ID: aebbcf24649552356d22519bb109c3ed06c0f685ae5e2c447f8828db73f661bf
                            • Instruction ID: a313c91d3bbf330689263043627e49c48e5194d4e35745961599615a395b85a7
                            • Opcode Fuzzy Hash: aebbcf24649552356d22519bb109c3ed06c0f685ae5e2c447f8828db73f661bf
                            • Instruction Fuzzy Hash: 54622A35A002188FCB14DF68D598AADBBF6FF88310F158069E506EB365DB35ED46CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 547 599da87-599dab8 548 599daba 547->548 549 599dabf-599dbb4 call 5990250 547->549 548->549 559 599dbbb-599dbe9 549->559 560 599dbb6 549->560 562 599df91-599df9a 559->562 560->559 563 599dbee-599dbf7 562->563 564 599dfa0-599e022 call 5990250 562->564 565 599dbf9 563->565 566 599dbfe-599dcdf call 5990250 * 2 call 599bebc call 59936cc 563->566 581 599e029-599e057 564->581 582 599e024 564->582 565->566 603 599dce4-599dd18 566->603 586 599e414-599e41d 581->586 582->581 588 599e05c-599e065 586->588 589 599e423-599e453 586->589 591 599e06c-599e186 call 5990250 * 2 call 599bebc call 59936cc 588->591 592 599e067 588->592 637 599e33b-599e341 591->637 592->591 607 599debb-599decf 603->607 610 599dd1d-599ddb5 call 5990250 call 59936dc 607->610 611 599ded5-599def2 607->611 635 599ddd1 610->635 636 599ddb7-599ddcf 610->636 616 599df01-599df02 611->616 617 599def4-599df00 611->617 616->562 617->616 638 599ddd7-599ddf8 635->638 636->638 639 599e348-599e34f 637->639 641 599deaa-599deba 638->641 642 599ddfe-599de79 call 5990250 call 59936dc 638->642 643 599e18b-599e229 call 5990250 call 59936dc 639->643 644 599e355-599e372 639->644 641->607 664 599de7b-599de93 642->664 665 599de95 642->665 668 599e22b-599e243 643->668 669 599e245 643->669 647 599e381 644->647 648 599e374-599e380 644->648 647->586 648->647 667 599de9b-599dea9 664->667 665->667 667->641 670 599e24b-599e26c 668->670 669->670 673 599e272-599e2f6 call 5990250 call 59936dc 670->673 674 599e327-599e33a 670->674 683 599e2f8-599e310 673->683 684 599e312 673->684 674->637 685 599e318-599e326 683->685 684->685 685->674
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: $^q$$^q$$^q$$^q
                            • API String ID: 0-2125118731
                            • Opcode ID: f1ae093a1a1fc8eb564d5d54c45ed25a4102d721617e315331442b565865e884
                            • Instruction ID: 7255feb58c58781618089f78a01070df215fe3854fbb6e64a5277121c307716e
                            • Opcode Fuzzy Hash: f1ae093a1a1fc8eb564d5d54c45ed25a4102d721617e315331442b565865e884
                            • Instruction Fuzzy Hash: D332B674E01228CFDB68DF68C894BDEB7B2BF89300F1095A9D009AB254DB359E85CF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1285 59939c0-59939db 1286 59939dd 1285->1286 1287 59939e2-5993a88 1285->1287 1286->1287 1292 5993c61-5993c6a 1287->1292 1293 5993a8d-5993a96 1292->1293 1294 5993c70-5993c87 1292->1294 1295 5993a98 1293->1295 1296 5993a9d-5993ae6 1293->1296 1295->1296 1302 5993c5d-5993c5e 1296->1302 1303 5993aec-5993b60 1296->1303 1302->1292 1306 5993b65-5993b6c 1303->1306 1307 5993b6e-5993b80 1306->1307 1308 5993b82 1306->1308 1309 5993b85-5993b9e 1307->1309 1308->1309 1311 5993c5c 1309->1311 1312 5993ba4-5993c5b call 5990250 1309->1312 1311->1302 1312->1311
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: $^q$$^q
                            • API String ID: 0-355816377
                            • Opcode ID: 655e5b76d00c1a7919c737b4cdeaf2a6860278516c61c1cdc289243974f8deca
                            • Instruction ID: d785a211f15f46394026423c60f2dbfbf9a03a32bdb38830524c440bda7316c0
                            • Opcode Fuzzy Hash: 655e5b76d00c1a7919c737b4cdeaf2a6860278516c61c1cdc289243974f8deca
                            • Instruction Fuzzy Hash: B561B074E00208DFDB04DFA9C884A9DBBB6FF89300F249569E505BB365DB34A946CF54
                            APIs
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 5e1afa01aadf3c872c7d49d9125bf99b12c214957d3cdbc12839796141ffaaf2
                            • Instruction ID: 3a903d7ae3fd6440ba42b2f66d8c482e307546676e1b7cbea9eeec4ed12af516
                            • Opcode Fuzzy Hash: 5e1afa01aadf3c872c7d49d9125bf99b12c214957d3cdbc12839796141ffaaf2
                            • Instruction Fuzzy Hash: B921DEB4E012189FCF18DFA9E484ADDBBB6FB89311F10902AE419B7360DB315846CF20
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2e8064ab66882f8c637fc2d66dde1ddbfe0bd14a682913293aa4f0985e4c52f0
                            • Instruction ID: 84dfa23f3618b12b39102e8a1526ad8f6fff4c7b0ec0cb98f988f7d5849d2c0e
                            • Opcode Fuzzy Hash: 2e8064ab66882f8c637fc2d66dde1ddbfe0bd14a682913293aa4f0985e4c52f0
                            • Instruction Fuzzy Hash: F2227F74E01229CFDB69DF68C994BD9B7B2BF49300F1085EAD549AB250EB316E85CF40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 503 85d0a8-85d147 GetCurrentProcess 507 85d150-85d184 GetCurrentThread 503->507 508 85d149-85d14f 503->508 509 85d186-85d18c 507->509 510 85d18d-85d1c1 GetCurrentProcess 507->510 508->507 509->510 511 85d1c3-85d1c9 510->511 512 85d1ca-85d1e5 call 85d289 510->512 511->512 516 85d1eb-85d21a GetCurrentThreadId 512->516 517 85d223-85d285 516->517 518 85d21c-85d222 516->518 518->517
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0085D136
                            • GetCurrentThread.KERNEL32 ref: 0085D173
                            • GetCurrentProcess.KERNEL32 ref: 0085D1B0
                            • GetCurrentThreadId.KERNEL32 ref: 0085D209
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: c5aa03f015760e22ec7a3f99d2594deb9647ffad68b6850bbbd726f744dc8386
                            • Instruction ID: b4877b11e8fb5b0608b8b472fbd72ef265b3acc18e5b2d517c2fd28152b1e1fb
                            • Opcode Fuzzy Hash: c5aa03f015760e22ec7a3f99d2594deb9647ffad68b6850bbbd726f744dc8386
                            • Instruction Fuzzy Hash: 1A5179B0900749CFDB14CFA9D948B9EBBF1EB48304F208069D819A73A0DB749988CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 525 85d0b8-85d147 GetCurrentProcess 529 85d150-85d184 GetCurrentThread 525->529 530 85d149-85d14f 525->530 531 85d186-85d18c 529->531 532 85d18d-85d1c1 GetCurrentProcess 529->532 530->529 531->532 533 85d1c3-85d1c9 532->533 534 85d1ca-85d1e5 call 85d289 532->534 533->534 538 85d1eb-85d21a GetCurrentThreadId 534->538 539 85d223-85d285 538->539 540 85d21c-85d222 538->540 540->539
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0085D136
                            • GetCurrentThread.KERNEL32 ref: 0085D173
                            • GetCurrentProcess.KERNEL32 ref: 0085D1B0
                            • GetCurrentThreadId.KERNEL32 ref: 0085D209
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 4e563a889e1c857119861cc631f493c9b8e04ca3a424681b6ef23c2dba6203fd
                            • Instruction ID: 4482cb2d9d27cd452193260c3550d9fc0fa836d71241abcafe264f9280438ecc
                            • Opcode Fuzzy Hash: 4e563a889e1c857119861cc631f493c9b8e04ca3a424681b6ef23c2dba6203fd
                            • Instruction Fuzzy Hash: 6F5168B0900709CFDB14DFA9D948B9EBBF1FB48305F208459E819A73A0DB749988CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 709 59a0660-59a0686 710 59a068c-59a0690 709->710 711 59a099d-59a09a6 709->711 714 59a09d1-59a09da 710->714 715 59a0696-59a069a 710->715 712 59a09a8-59a09ad 711->712 713 59a09af-59a09ca 711->713 712->713 713->714 716 59a09dc-59a09e1 714->716 717 59a09e3-59a09fe 714->717 718 59a06a0-59a06ad 715->718 719 59a0a05-59a0a0e 715->719 716->717 717->719 730 59a06af-59a06bd 718->730 731 59a06c5-59a06e4 718->731 721 59a0a10-59a0a15 719->721 722 59a0a17-59a0a7c 719->722 721->722 744 59a0a83-59a0a8c 722->744 730->731 738 59a0760-59a0762 731->738 739 59a06e6-59a06ed 731->739 743 59a0768-59a076b 738->743 738->744 741 59a06ef-59a0737 739->741 742 59a075d 739->742 772 59a073f-59a0755 741->772 742->738 745 59a0aff-59a0b44 743->745 746 59a0771-59a0784 743->746 747 59a0a8e-59a0a93 744->747 748 59a0a95-59a0af8 744->748 784 59a0b4e-59a0b57 745->784 785 59a0b46 745->785 757 59a0791-59a079f 746->757 758 59a0786-59a078f 746->758 747->748 748->745 759 59a07a2-59a07b4 call 59a0db1 757->759 758->759 765 59a07ba-59a07c4 759->765 773 59a07ca-59a07d1 765->773 774 59a08fc-59a08ff 765->774 772->742 773->774 775 59a07d7-59a07de 773->775 778 59a0903-59a090a 774->778 782 59a0891-59a08f1 775->782 783 59a07e4-59a07eb 775->783 779 59a092b-59a0937 778->779 780 59a090c-59a0929 778->780 792 59a093f-59a0947 779->792 780->792 782->778 788 59a07ed-59a07fc 783->788 789 59a0804-59a080e 783->789 786 59a0b59-59a0b5e 784->786 787 59a0b60-59a0ba7 784->787 785->784 786->787 824 59a0ba9-59a0bb3 787->824 825 59a0bb4-59a0bb6 787->825 788->789 789->782 795 59a0814-59a0831 789->795 804 59a0969-59a0977 792->804 805 59a0949-59a094e 792->805 811 59a086a-59a0883 795->811 812 59a0833-59a0868 795->812 814 59a0979-59a097d 804->814 815 59a0986-59a099a 804->815 807 59a095d-59a0960 805->807 808 59a0950-59a095b 805->808 807->804 808->807 820 59a088e-59a088f 811->820 821 59a0885 811->821 812->811 814->815 820->782 821->820
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4a6j$t]6j
                            • API String ID: 0-2068480990
                            • Opcode ID: e5cd1970eafcfa9d9965d6e48f7058605f59658657ee2b1f6aa5880dc736b264
                            • Instruction ID: 7537ffbe462bf05f83f18563dc6ab07d117b9e8a1af09035f0472d7c051f635e
                            • Opcode Fuzzy Hash: e5cd1970eafcfa9d9965d6e48f7058605f59658657ee2b1f6aa5880dc736b264
                            • Instruction Fuzzy Hash: C6F14B35B002489FDB15DFA8D458AADBBF6FF88300F144469E9069B3A5DB35EC45CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 831 59a84a8-59a84b7 832 59a84b9-59a84bc 831->832 833 59a84be-59a84ce 831->833 832->833 834 59a84d1-59a84d4 832->834 835 59a84d6-59a84da 834->835 836 59a8547-59a854b 834->836 837 59a84dc-59a84eb 835->837 838 59a84f3-59a84f9 835->838 839 59a854d-59a855d 836->839 840 59a8565-59a856e 836->840 837->838 841 59a85cf-59a85f1 838->841 842 59a84ff-59a8508 838->842 839->840 840->841 843 59a8570-59a8579 840->843 851 59a9abb 841->851 852 59a85f7 841->852 846 59a850e-59a8515 842->846 847 59a85b5-59a85cc 842->847 843->847 848 59a857b-59a85ae 843->848 853 59a851b-59a8545 846->853 848->847 855 59a9abd-59a9abe 851->855 856 59a899a-59a89a0 852->856 857 59a8698-59a869e 852->857 858 59a8819-59a881f 852->858 859 59a861f-59a8625 852->859 860 59a871c-59a8722 852->860 861 59a889d-59a88a3 852->861 862 59a8892-59a8898 852->862 863 59a8711-59a8717 852->863 864 59a8916-59a891c 852->864 865 59a8614-59a861a 852->865 866 59a8795-59a879b 852->866 867 59a878a-59a8790 852->867 868 59a890b-59a8911 852->868 869 59a8609-59a860f 852->869 870 59a880e-59a8814 852->870 871 59a898f-59a8995 852->871 872 59a868d-59a8693 852->872 873 59a8682-59a8688 852->873 874 59a8803-59a8809 852->874 875 59a8900-59a8906 852->875 876 59a8706-59a870c 852->876 877 59a8887-59a888d 852->877 878 59a8984-59a898a 852->878 879 59a883a-59a8840 852->879 880 59a89bb-59a89c1 852->880 881 59a86b9-59a86bf 852->881 882 59a88be-59a88c4 852->882 883 59a873d-59a8743 852->883 884 59a8732-59a8738 852->884 885 59a88b3-59a88b9 852->885 886 59a89b0-59a89b6 852->886 887 59a87b6-59a87bc 852->887 888 59a8937-59a893d 852->888 889 59a8635-59a863b 852->889 890 59a862a-59a8630 852->890 891 59a87ab-59a87b1 852->891 892 59a88a8-59a88ae 852->892 893 59a86ae-59a86b4 852->893 894 59a882f-59a8835 852->894 895 59a892c-59a8932 852->895 896 59a86a3-59a86a9 852->896 897 59a87a0-59a87a6 852->897 898 59a8921-59a8927 852->898 899 59a8727-59a872d 852->899 900 59a8824-59a882a 852->900 901 59a89a5-59a89ab 852->901 902 59a86da-59a86e0 852->902 903 59a885b-59a8861 852->903 904 59a8958-59a895e 852->904 905 59a875e-59a8764 852->905 906 59a88df-59a88e5 852->906 907 59a89dc-59a89e2 852->907 908 59a8753-59a8759 852->908 909 59a8850-59a8856 852->909 910 59a89d1-59a89d7 852->910 911 59a8656-59a865c 852->911 912 59a87d7-59a87dd 852->912 913 59a88d4-59a88da 852->913 914 59a864b-59a8651 852->914 915 59a8748-59a874e 852->915 916 59a88c9-59a88cf 852->916 917 59a86cf-59a86d5 852->917 918 59a87cc-59a87d2 852->918 919 59a894d-59a8953 852->919 920 59a8942-59a8948 852->920 921 59a8640-59a8646 852->921 922 59a87c1-59a87c7 852->922 923 59a89c6-59a89cc 852->923 924 59a86c4-59a86ca 852->924 925 59a8845-59a884b 852->925 926 59a86fb-59a8701 852->926 927 59a87f8-59a87fe 852->927 928 59a8979-59a897f 852->928 929 59a85fe-59a8604 852->929 930 59a877f-59a8785 852->930 931 59a887c-59a8882 852->931 932 59a86f0-59a86f6 852->932 933 59a8871-59a8877 852->933 934 59a8677-59a867d 852->934 935 59a8774-59a877a 852->935 936 59a88f5-59a88fb 852->936 937 59a88ea-59a88f0 852->937 938 59a8769-59a876f 852->938 939 59a896e-59a8974 852->939 940 59a866c-59a8672 852->940 941 59a87ed-59a87f3 852->941 942 59a87e2-59a87e8 852->942 943 59a8963-59a8969 852->943 944 59a8661-59a8667 852->944 945 59a8866-59a886c 852->945 946 59a86e5-59a86eb 852->946 853->847 856->855 857->855 858->855 859->855 860->855 861->855 862->855 863->855 864->855 865->855 866->855 867->855 868->855 869->855 870->855 871->855 872->855 873->855 874->855 875->855 876->855 877->855 878->855 879->855 880->855 881->855 882->855 883->855 884->855 885->855 886->855 887->855 888->855 889->855 890->855 891->855 892->855 893->855 894->855 895->855 896->855 897->855 898->855 899->855 900->855 901->855 902->855 903->855 904->855 905->855 906->855 907->855 908->855 909->855 910->855 911->855 912->855 913->855 914->855 915->855 916->855 917->855 918->855 919->855 920->855 921->855 922->855 923->855 924->855 925->855 926->855 927->855 928->855 929->855 930->855 931->855 932->855 933->855 934->855 935->855 936->855 937->855 938->855 939->855 940->855 941->855 942->855 943->855 944->855 945->855 946->855
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: D6j$D6j
                            • API String ID: 0-1248428422
                            • Opcode ID: 42a92f975e74db22a065513856ae018aa64de389d3e69d18b8991a50fbe4353b
                            • Instruction ID: 1cdcfcfdd530e537715b0e2ff4853fdbfe05aa94eb72355b7a067389da13276a
                            • Opcode Fuzzy Hash: 42a92f975e74db22a065513856ae018aa64de389d3e69d18b8991a50fbe4353b
                            • Instruction Fuzzy Hash: 6FC1D2B6218904CFC318EF18E988C6677F6B7553407054996E1238FB6DC771EE4AABE0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 952 59ac618-59ac63b 953 59ac641-59ac643 952->953 954 59ac904-59ac90d 952->954 955 59ac649-59ac655 953->955 956 59ac952-59ac96f 953->956 957 59ac90f-59ac914 954->957 958 59ac916-59ac933 954->958 963 59ac66a-59ac67b 955->963 964 59ac657-59ac65e 955->964 973 59ac974 956->973 957->958 974 59ac937-59ac938 958->974 1040 59ac67d call 59acc7a 963->1040 1041 59ac67d call 59acc80 963->1041 965 59ac6b9-59ac6c2 964->965 966 59ac660-59ac665 964->966 969 59ac6cb-59ac71a 965->969 970 59ac6c4-59ac6c9 965->970 971 59ac8ee-59ac8f8 966->971 999 59ac71c-59ac721 969->999 1000 59ac723-59ac7ba 969->1000 970->969 977 59ac9e9-59ac9ea 973->977 978 59ac976 973->978 980 59ac93a 974->980 981 59ac9ad-59ac9b9 974->981 983 59ac903 978->983 984 59ac977-59ac99d 978->984 979 59ac683-59ac6ab 992 59ac6ad 979->992 993 59ac6b6 979->993 980->973 985 59ac93b-59ac94b 980->985 981->956 982 59ac9bb 981->982 983->954 984->974 995 59ac99f-59ac9a4 984->995 985->956 992->993 993->965 999->1000 1013 59ac7bc-59ac7c1 1000->1013 1014 59ac7c3-59ac85a 1000->1014 1013->1014 1027 59ac85c-59ac861 1014->1027 1028 59ac863-59ac8e7 1014->1028 1027->1028 1028->971 1040->979 1041->979
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq$(bq
                            • API String ID: 0-4224401849
                            • Opcode ID: fc7267ec48b9c41d8ca34d8efd7abc8a398b2645343096fc0074c0435447807e
                            • Instruction ID: f7474ef70afb932803bdbdb5dca5e24f7b6891b8df5f3ad895ae28b913176b78
                            • Opcode Fuzzy Hash: fc7267ec48b9c41d8ca34d8efd7abc8a398b2645343096fc0074c0435447807e
                            • Instruction Fuzzy Hash: 1BA17135B002488FDB15EB789458A7D7BF7AFC9340F1844A9E506EB392DE39DC058B91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1042 59a0040-59a00a8 1047 59a00ae-59a00f5 1042->1047 1048 59a019d-59a01a6 1042->1048 1115 59a00f8 call 59a0530 1047->1115 1116 59a00f8 call 59a0520 1047->1116 1049 59a01a8-59a01ad 1048->1049 1050 59a01af-59a0284 1048->1050 1049->1050 1080 59a02ce-59a02d7 1050->1080 1081 59a0286-59a02a9 1050->1081 1060 59a00fb-59a010a 1064 59a010c-59a012f 1060->1064 1065 59a0137-59a0150 1060->1065 1064->1065 1067 59a015b-59a015c 1065->1067 1068 59a0152 1065->1068 1067->1048 1068->1067 1083 59a02da-59a033a 1081->1083 1084 59a02ab-59a02ad 1081->1084 1093 59a033c 1083->1093 1094 59a0341-59a0350 1083->1094 1085 59a02bf-59a02cb 1084->1085 1086 59a02af-59a02bb 1084->1086 1086->1085 1090 59a02bd 1086->1090 1090->1085 1093->1094 1096 59a03e6-59a0402 1094->1096 1097 59a0356-59a035c 1094->1097 1100 59a0409-59a040f 1096->1100 1098 59a037e-59a03a8 1097->1098 1099 59a035e-59a0379 1097->1099 1110 59a03aa-59a03bd 1098->1110 1111 59a03c5-59a03e4 1098->1111 1099->1100 1103 59a0419 1100->1103 1104 59a0411 1100->1104 1106 59a041a 1103->1106 1104->1103 1106->1106 1110->1111 1111->1100 1115->1060 1116->1060
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (_^q$4'^q
                            • API String ID: 0-2508332758
                            • Opcode ID: d78fbd6ba713d1bbeae859814c18536cbc228ec616c797e42634a252639db179
                            • Instruction ID: f1af82df65868bab285b7b2fbe209dba952a93709f1f3e04fd371b1b9f4d9848
                            • Opcode Fuzzy Hash: d78fbd6ba713d1bbeae859814c18536cbc228ec616c797e42634a252639db179
                            • Instruction Fuzzy Hash: 56B17F31B106088FCB14EFB9D459AADBBF6FF89300F158469E506AB351DF34A946CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1117 59af618-59af628 1118 59af71a-59af723 1117->1118 1119 59af62e-59af632 1117->1119 1122 59af72c-59af761 1118->1122 1123 59af725-59af72a 1118->1123 1120 59af768-59af771 1119->1120 1121 59af638-59af63e 1119->1121 1124 59af77a-59af7af 1120->1124 1125 59af773-59af778 1120->1125 1126 59af648-59af64b 1121->1126 1127 59af640-59af646 1121->1127 1122->1120 1123->1122 1142 59af7b6-59af7c0 1124->1142 1125->1124 1128 59af64e-59af653 1126->1128 1127->1128 1132 59af690-59af699 1128->1132 1133 59af655-59af664 1128->1133 1136 59af69b-59af6b6 1132->1136 1137 59af6e6-59af6f4 1132->1137 1141 59af66a-59af682 1133->1141 1133->1142 1154 59af6b8-59af6c1 1136->1154 1155 59af6ce-59af6da 1136->1155 1144 59af6fc-59af701 1137->1144 1141->1132 1162 59af684-59af68d 1141->1162 1146 59af7ca-59af834 1142->1146 1147 59af7c2-59af7c7 1142->1147 1148 59af70d-59af717 1144->1148 1149 59af703-59af707 1144->1149 1171 59af835-59af8a0 1146->1171 1147->1146 1149->1148 1181 59af6c3 call 59af970 1154->1181 1182 59af6c3 call 59af961 1154->1182 1155->1137 1163 59af6dc-59af6e4 1155->1163 1159 59af6c9-59af6cc 1159->1137 1163->1136 1180 59af8a2-59af8a3 1171->1180 1181->1159 1182->1159
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq$(bq
                            • API String ID: 0-4224401849
                            • Opcode ID: 917b4278f6bf40abb4a1407525ed631a7fd871ab2b0b5c82b1130c4d15c42ae6
                            • Instruction ID: 40f206255a98c154e54828372e3728753ba0f247c6c767e4cba5ee38cfa944c6
                            • Opcode Fuzzy Hash: 917b4278f6bf40abb4a1407525ed631a7fd871ab2b0b5c82b1130c4d15c42ae6
                            • Instruction Fuzzy Hash: 9A815F357002158FDB05DF78D498A2E7BEAAFC9741B188069E506DB3A5DF35DD01CBA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1227 59a33f7-59a33f8 1228 59a33fa-59a340c 1227->1228 1229 59a33b4-59a33b9 1227->1229 1232 59a3412-59a3483 1228->1232 1233 59a3573-59a3590 1228->1233 1230 59a33c1-59a33c8 1229->1230 1264 59a348c-59a34b7 1232->1264 1265 59a3485-59a348a 1232->1265 1236 59a3592-59a35ab 1233->1236 1237 59a35b1-59a35bd 1233->1237 1238 59a35ad-59a35af 1236->1238 1239 59a35c0-59a35ca 1236->1239 1238->1237 1241 59a3616-59a3620 1238->1241 1243 59a35cc-59a35d1 1239->1243 1244 59a35d4-59a360f 1239->1244 1245 59a362a-59a367f 1241->1245 1246 59a3622-59a3627 1241->1246 1243->1244 1244->1241 1246->1245 1270 59a34b9-59a34be 1264->1270 1271 59a34c0-59a356c 1264->1271 1265->1264 1270->1271 1271->1233
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq$(bq
                            • API String ID: 0-4224401849
                            • Opcode ID: aec59dabd6f17016ebaf850a185c11cee6f99bd7f3fb0cd7784ce46f0eac14b2
                            • Instruction ID: 0a79e53374cc0eb2863cc9ba889afb1f273d2836960a97a1a119de7ad7833f3b
                            • Opcode Fuzzy Hash: aec59dabd6f17016ebaf850a185c11cee6f99bd7f3fb0cd7784ce46f0eac14b2
                            • Instruction Fuzzy Hash: 3A71CD30B002499FDB05EB789458A2EBBF6AFC5340F2485A9D505DB392DE39DE058B91
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: Z7j$|6j
                            • API String ID: 0-4225415791
                            • Opcode ID: 0f3b9a277e3e32fcb07df44f03ef009c4867215534252d630d6889bb98ce3b0a
                            • Instruction ID: b3227e1103e4d66df3ea484dee86238a38a3a52a2770a866e46c18c5e8558409
                            • Opcode Fuzzy Hash: 0f3b9a277e3e32fcb07df44f03ef009c4867215534252d630d6889bb98ce3b0a
                            • Instruction Fuzzy Hash: D52196363402048FCB05EB68D9556ADBBA2EFC4311B144539E106CB765DF71ED4A8BD0
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0085B086
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 604d680bd60f68aebfc6c633cf9b2721a76e9842a1b8f8ffa06d6e34f39dc427
                            • Instruction ID: 58e8fbef2ecb4ba6820299f7dce804d10ab8bfe7c0b717e5967d3e2bb90e2a35
                            • Opcode Fuzzy Hash: 604d680bd60f68aebfc6c633cf9b2721a76e9842a1b8f8ffa06d6e34f39dc427
                            • Instruction Fuzzy Hash: BB7126B0A00B058FD728DF29D48575ABBF1FF48305F008A2DD88AD7A50DB75E949CB92
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: u\
                            • API String ID: 0-4154003358
                            • Opcode ID: 23b8c1138638e292f2eaaef288409eacf37720ebd13a5f9bba1104080139e8e0
                            • Instruction ID: 1afa7d1d550abc666418736dc6a2ed5badaee8422d88328a9a08af19c6cd5838
                            • Opcode Fuzzy Hash: 23b8c1138638e292f2eaaef288409eacf37720ebd13a5f9bba1104080139e8e0
                            • Instruction Fuzzy Hash: EB027C71A006058FDB21DF68C844BAABBF6FF85300F158599E449AB352DB35ED85CF90
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 049B1E02
                            Memory Dump Source
                            • Source File: 00000002.00000002.1786498868.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_49b0000_MSBuild.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: ab4ea91da8d905796e91a0ad24fac12300cdd3d8ed46ad74416772ba03f9aafd
                            • Instruction ID: 3c68607caa0940bc80b32ff111037bd1fe586b40466f62ccb005e65961991f18
                            • Opcode Fuzzy Hash: ab4ea91da8d905796e91a0ad24fac12300cdd3d8ed46ad74416772ba03f9aafd
                            • Instruction Fuzzy Hash: E851E2B1D00319DFDB14CF99C995ADEBBB5FF88350F24812AE818AB210D770A945CF91
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 049B1E02
                            Memory Dump Source
                            • Source File: 00000002.00000002.1786498868.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_49b0000_MSBuild.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 33be2f10a8455f8e64f95b3f519e55cdb0528a5d9ac72f8d392bef2f8c78929b
                            • Instruction ID: c92708f696d6709fbb7b79fa6b85eb80ca4757db1deaa6a73fd3926106080c52
                            • Opcode Fuzzy Hash: 33be2f10a8455f8e64f95b3f519e55cdb0528a5d9ac72f8d392bef2f8c78929b
                            • Instruction Fuzzy Hash: 0541B0B1D00309DFDB14CF99C995ADEBBB5BF88350F24812AE819AB210D771A945CF91
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 008559F1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: c4e221591b1b8b8a333c2a3ca2192932a8d42064d123a20124743ff80e0b1faf
                            • Instruction ID: 933aacf7f39c821e66a98b5a04c1bc484bdcf88801676d4a08b89c4d39d2bf39
                            • Opcode Fuzzy Hash: c4e221591b1b8b8a333c2a3ca2192932a8d42064d123a20124743ff80e0b1faf
                            • Instruction Fuzzy Hash: 1941D3B0C00619CFDB24CFA9C88478DBBF5FF45304F24819AD408AB255DBB5694ACF91
                            APIs
                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 049B4381
                            Memory Dump Source
                            • Source File: 00000002.00000002.1786498868.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_49b0000_MSBuild.jbxd
                            Similarity
                            • API ID: CallProcWindow
                            • String ID:
                            • API String ID: 2714655100-0
                            • Opcode ID: c7b22c1bc377bb8d95d52e6295ac4c4eaa62aa17f688389192922fda95890326
                            • Instruction ID: b132241bb7d71f5b848e2fda09c1355d400db1d67c9fefada6fb9ab2f268c006
                            • Opcode Fuzzy Hash: c7b22c1bc377bb8d95d52e6295ac4c4eaa62aa17f688389192922fda95890326
                            • Instruction Fuzzy Hash: 624139B4900305CFCB14CF99C548AAABBF5FF88314F18C499D559AB321D771A841CFA0
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 008559F1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: d8358c8a7f35acdc4f2695c015345bc06bf2e88cb2cd93d8fbeb4c7ded46aef2
                            • Instruction ID: f2bcbbb1b8ca3dfae995531d1c95ddc99792448167c4f74e8b2f15831d84dd9c
                            • Opcode Fuzzy Hash: d8358c8a7f35acdc4f2695c015345bc06bf2e88cb2cd93d8fbeb4c7ded46aef2
                            • Instruction Fuzzy Hash: 5341D2B0C00619CFDB24CFA9C884B9DBBF5FF48305F6481AAD808AB255DB756949CF90
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: t]6j
                            • API String ID: 0-2231782407
                            • Opcode ID: 9cffe54861cec446cf7ab121c1fa968a57ab984a7256b860d039e21cd33840e2
                            • Instruction ID: e3729eede0e4f570ea909556938337387c925a1ede10cd9fbfc0a461d10f8b6c
                            • Opcode Fuzzy Hash: 9cffe54861cec446cf7ab121c1fa968a57ab984a7256b860d039e21cd33840e2
                            • Instruction Fuzzy Hash: ADC13675B002049FCB14DF78D498A6ABBF6EF89300F148569E5069B3A5DF35EC46CBA0
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0085D387
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: e813b9ad457a1bfd4071c4c20cc36b52d10880bceac9504458c8539ef7b157e9
                            • Instruction ID: f51931d77509a91194197e0cbff25b805d60b23c74579f47af843f10b32018fc
                            • Opcode Fuzzy Hash: e813b9ad457a1bfd4071c4c20cc36b52d10880bceac9504458c8539ef7b157e9
                            • Instruction Fuzzy Hash: E22103B5901319DFDB10CF9AD984AEEBBF4FB48310F10802AE918A7350D374AA45CFA5
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0085D387
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 6c2c35f847664cec026b0266082e86cc6ddc3c414b8e04079868d1358b7a35d6
                            • Instruction ID: 74416fe55b5f7205074a9ff45e9ef437702fe3d9331332d01cd1b5be852745cd
                            • Opcode Fuzzy Hash: 6c2c35f847664cec026b0266082e86cc6ddc3c414b8e04079868d1358b7a35d6
                            • Instruction Fuzzy Hash: 4221E2B5900308DFDB10CFAAD984ADEBBF8FB48320F14801AE918A3310D374A944CFA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: u\
                            • API String ID: 0-4154003358
                            • Opcode ID: 02a31d342b856896a6e5e88dc295f7f88ea078e54fe687be325fc074cc113825
                            • Instruction ID: cadce98f13cf970b2d9bef1077524ff86512132be8aa834957a2d9436cc12d44
                            • Opcode Fuzzy Hash: 02a31d342b856896a6e5e88dc295f7f88ea078e54fe687be325fc074cc113825
                            • Instruction Fuzzy Hash: 6DE13671A006198FCB21DF68C484BA9BBB2FF45304F158699E849AB352DB34ED85CF90
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0085B101,00000800,00000000,00000000), ref: 0085B312
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: b493e206293e845589e6a8202d1ed12d04a46ac08e796bb25a095f57f94aa155
                            • Instruction ID: 67cd20204e4c6ac4cccc66f117ba01e11828d0da196c00f1853b92b9cfde67d5
                            • Opcode Fuzzy Hash: b493e206293e845589e6a8202d1ed12d04a46ac08e796bb25a095f57f94aa155
                            • Instruction Fuzzy Hash: 5C11D3B69003499FDB20CF9AC444AEEFBF4EB58311F10846AD959A7310C375A949CFA5
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0085B101,00000800,00000000,00000000), ref: 0085B312
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: c24516f2fed15af477c3ca049703c34eebea9c130cdda6ede1e022058fc8f7c7
                            • Instruction ID: e2e27714eea1db7d911741fb408cd5068befec0a397bb17c2d306492f34df633
                            • Opcode Fuzzy Hash: c24516f2fed15af477c3ca049703c34eebea9c130cdda6ede1e022058fc8f7c7
                            • Instruction Fuzzy Hash: 2F11E2B69003498FDB10CFAAC844ADEFBF4EB98310F14846AD969A7211C375A545CFA5
                            APIs
                            • GetKeyboardLayout.USER32(00000000), ref: 05994266
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID: KeyboardLayout
                            • String ID:
                            • API String ID: 194098044-0
                            • Opcode ID: 7063d230f8acb68e6b8ba33e7fb2dc69c465f05bb3fb7c6cbcb05c228bb5c1f3
                            • Instruction ID: 5e6bd3120b2a0339ad662e3ca5539a54598d2583a986f9beb83a6a40cca04d97
                            • Opcode Fuzzy Hash: 7063d230f8acb68e6b8ba33e7fb2dc69c465f05bb3fb7c6cbcb05c228bb5c1f3
                            • Instruction Fuzzy Hash: DA1146B1A043089FCB10EFA9D4497DEBBF4FB48324F108459D559A7340C739A545CFA5
                            APIs
                            • OleInitialize.OLE32(00000000), ref: 05994355
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID: Initialize
                            • String ID:
                            • API String ID: 2538663250-0
                            • Opcode ID: 7583ed9b0208dbca3d9c56d5dc4a85cad311f50504ad05d45b237fc021073c81
                            • Instruction ID: 2133df4b0352ea35095309ba28e9e0a456735b74a76e151bb5680eb3bad28359
                            • Opcode Fuzzy Hash: 7583ed9b0208dbca3d9c56d5dc4a85cad311f50504ad05d45b237fc021073c81
                            • Instruction Fuzzy Hash: 421143B19047488FCB20CFAAD54ABDEBBF4EB48314F248459D519A7211C374A945CFA5
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0085B086
                            Memory Dump Source
                            • Source File: 00000002.00000002.1781158862.0000000000850000.00000040.00000800.00020000.00000000.sdmp, Offset: 00850000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_850000_MSBuild.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 45b5d5077234e488f36c608f3d335ae2efdbc6a65a33520efc81c7adcac77e62
                            • Instruction ID: 9cc72317b4427e901c0d5d801248914ccba35a52d04fd480671f93e5abab6d24
                            • Opcode Fuzzy Hash: 45b5d5077234e488f36c608f3d335ae2efdbc6a65a33520efc81c7adcac77e62
                            • Instruction Fuzzy Hash: 3511DFB5C007498FCB20DF9AC444ADEFBF4EB88324F10846AD969A7250C375A649CFA5
                            APIs
                            • OleInitialize.OLE32(00000000), ref: 05994355
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID: Initialize
                            • String ID:
                            • API String ID: 2538663250-0
                            • Opcode ID: cc3d755931cf80d9daa4a766b88aad751f173d4cbe92ab4203a53739913e1e70
                            • Instruction ID: af3e79e5b76fcce87bf7072c7a6396f305a6af67f7d50aed7c570eb0bb214bdc
                            • Opcode Fuzzy Hash: cc3d755931cf80d9daa4a766b88aad751f173d4cbe92ab4203a53739913e1e70
                            • Instruction Fuzzy Hash: 871130B18047488FCB20DFAAD549B9EBBF8EB48324F208459D519A7310C374A945CFA5
                            APIs
                            • OleInitialize.OLE32(00000000), ref: 05994355
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID: Initialize
                            • String ID:
                            • API String ID: 2538663250-0
                            • Opcode ID: ca2f00281792cb3b19091deeca2e2279fc214f0fa3a876775b316251a61d8043
                            • Instruction ID: 52e8b1e313d598f31f5e3e1a5195870ad7cb0b0f3283c2675d96f854fb781576
                            • Opcode Fuzzy Hash: ca2f00281792cb3b19091deeca2e2279fc214f0fa3a876775b316251a61d8043
                            • Instruction Fuzzy Hash: 301112B19007498FCB20DFAAC589BDEFBF8EB48324F24845AD519A7310C378A545CFA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: d^6j
                            • API String ID: 0-3612976577
                            • Opcode ID: 5116f37b139808a9aeb7be9284793d88a2a471be01a080368a1f4eb624fc50cd
                            • Instruction ID: 8e9d008431fddb6f6f73a9d7ea411e242da70f57ea22c938fc3ad019047f3529
                            • Opcode Fuzzy Hash: 5116f37b139808a9aeb7be9284793d88a2a471be01a080368a1f4eb624fc50cd
                            • Instruction Fuzzy Hash: 62514D35B007049FCB259F79D88896EBBF6FFC92107148629E54AD7365DB34EC058B90
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: t]6j
                            • API String ID: 0-2231782407
                            • Opcode ID: 6a7fa95496be2d1d2431415487de27f1b3441f242706849299c4cc36fff442e4
                            • Instruction ID: b3b095698f3c979c3f7412d423af260ff4e8fd7fedc9b40ad19ba837ead1691b
                            • Opcode Fuzzy Hash: 6a7fa95496be2d1d2431415487de27f1b3441f242706849299c4cc36fff442e4
                            • Instruction Fuzzy Hash: E1614C35A00205DFCB14DF68D598AADBBF6FF88300F148569E8069B361DB71ED46CBA0
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq
                            • API String ID: 0-149360118
                            • Opcode ID: 313a701566f30afbfc6725d5809b67ad9436196c1c459ae9904bc03aa844909f
                            • Instruction ID: b9245064477b90ae638d3b057e049b0a79b3042deee7417b8ee5289e01163369
                            • Opcode Fuzzy Hash: 313a701566f30afbfc6725d5809b67ad9436196c1c459ae9904bc03aa844909f
                            • Instruction Fuzzy Hash: 4F51A035F002498FDB44AB78A41827EBBF7FFD5340B24456AD606D7381DE38AD068B95
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: t]6j
                            • API String ID: 0-2231782407
                            • Opcode ID: 258144e475c2487f375ceb3b95576087af6a27616a58a28ec90c60a6c9de7008
                            • Instruction ID: 5a6a4c976cb7ee0ddc254c122f952b0a47646a8102ae0cd836674bd371718519
                            • Opcode Fuzzy Hash: 258144e475c2487f375ceb3b95576087af6a27616a58a28ec90c60a6c9de7008
                            • Instruction Fuzzy Hash: 35711875A00209DFCB15DF68D588AADBBB2FF48310F054468E806AB3A1DB75ED85CF90
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: PH^q
                            • API String ID: 0-2549759414
                            • Opcode ID: 4abd8717319e7a991ba5e1efad300b18eb0e1735572d680e225b6e55adfacc63
                            • Instruction ID: fb00f41b8656db9d5ae7262f56555a31697a77154553627f70a05ae355ae33a2
                            • Opcode Fuzzy Hash: 4abd8717319e7a991ba5e1efad300b18eb0e1735572d680e225b6e55adfacc63
                            • Instruction Fuzzy Hash: FB51F532A083858FDB15CB79D80476ABBFABF81200F0D81AAD459C7655DB34E881CBE1
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (_^q
                            • API String ID: 0-538443824
                            • Opcode ID: d42c8a30814d105be1fa9bc233463647d13fd0fa924624461dfab62d6e8842c3
                            • Instruction ID: df6e1824fc1914dd4107f02fcce6f2f73b27b2cb58feac53eb7c977c5a461991
                            • Opcode Fuzzy Hash: d42c8a30814d105be1fa9bc233463647d13fd0fa924624461dfab62d6e8842c3
                            • Instruction Fuzzy Hash: D551C131A04248DFCB05EFB8D8549ADBBF5FF89300F05856AE405AB351EF35A909CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq
                            • API String ID: 0-149360118
                            • Opcode ID: a95a9b9cad9d927a1dc22817665315de82fb4282f28bf06fe252d39808e9b491
                            • Instruction ID: ac56f9768d11d658017b32a1c3bc5c112fcd3600fe940be8d6d50fef22b71aa2
                            • Opcode Fuzzy Hash: a95a9b9cad9d927a1dc22817665315de82fb4282f28bf06fe252d39808e9b491
                            • Instruction Fuzzy Hash: 584183316002048FC725EF29D948A6DBBF6FFC4350B148A6AD14A8B365DF74E94A8BD1
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: (bq
                            • API String ID: 0-149360118
                            • Opcode ID: 4c2f90fd65c24b56de770e0f3a874b7f4a8c8709172a3dbb6090d05dca199510
                            • Instruction ID: 30c2321986e8ecbe9002b8e8a6589c798855acfe27503fbafb61e5fb223cbed6
                            • Opcode Fuzzy Hash: 4c2f90fd65c24b56de770e0f3a874b7f4a8c8709172a3dbb6090d05dca199510
                            • Instruction Fuzzy Hash: 98116632B043584FD7059A39581467E7BEBDBC625071980ABD508D3382DE38CC068361
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4da6e9dcdf51a40dfd2c1cfeca5019599f83fc33bebde29bb2906535ee5a736a
                            • Instruction ID: 1d2b151876631793adfcfea2fafef4372d499e816baced21018bb80ad695dbb7
                            • Opcode Fuzzy Hash: 4da6e9dcdf51a40dfd2c1cfeca5019599f83fc33bebde29bb2906535ee5a736a
                            • Instruction Fuzzy Hash: EF127E34A01208CFCB2ADFB4D5989ADBB72FF49355B60496DE406AB351CB36AD81CF50
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6d12ca914e20714821dd52a7c1198c4887b214379bfaaee5feb40cc6a68438d1
                            • Instruction ID: 23ced12b537b535c984e13f29b9d7169183cc6b64428e56917f32dc8362c6414
                            • Opcode Fuzzy Hash: 6d12ca914e20714821dd52a7c1198c4887b214379bfaaee5feb40cc6a68438d1
                            • Instruction Fuzzy Hash: 7D127E34A01208CFCB2ADFB4D5989ADBB72FF49355B60496DE406AB351CB36AD81CF50
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5abb8cfbde01c16730c73ececf9defc2cf5e97a9e62c36e2b1d60c79bf224398
                            • Instruction ID: 8891ef36838b286583959da8836c15a996008db722ccff10d66cdf4e7e0cd7cd
                            • Opcode Fuzzy Hash: 5abb8cfbde01c16730c73ececf9defc2cf5e97a9e62c36e2b1d60c79bf224398
                            • Instruction Fuzzy Hash: DA023F35A00719CFDB14DF78C854A69BBB6FF49310F118699E949AB361DB30E981CF80
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 525c204240311c07a32592620f72ae4353fa2b7540326775d0d49adca22e47b0
                            • Instruction ID: de7867ecaf9a6d50cce58eb7c44e5b81b6942b74cbf166484078ac5aad3c4187
                            • Opcode Fuzzy Hash: 525c204240311c07a32592620f72ae4353fa2b7540326775d0d49adca22e47b0
                            • Instruction Fuzzy Hash: 46D18B31B002498FDB14DBB8D499AADBBF6EF88340F158469E805EB395DF34DD058BA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c0c059097bc4870b0ad95048f7571c66a85fe2a515402eefe404d8143b2449bd
                            • Instruction ID: 53b25f06c1f98fc222160346ee2b5c9d78a41fe0223bf092d396ba7146b1af2a
                            • Opcode Fuzzy Hash: c0c059097bc4870b0ad95048f7571c66a85fe2a515402eefe404d8143b2449bd
                            • Instruction Fuzzy Hash: CEC1276E29816ADE8656EBBC2C8422E2571BECD31430FDC279435BB6C6CE5BC407C1D6
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8fd75cfab81bdab49edb2decaccdd7c0e7468e9d83ef0ba74edf6c944be3d5f5
                            • Instruction ID: ccfbd912a6b3941750094a802e29d78859b30509a67ee1ef081631aa2a8b7c17
                            • Opcode Fuzzy Hash: 8fd75cfab81bdab49edb2decaccdd7c0e7468e9d83ef0ba74edf6c944be3d5f5
                            • Instruction Fuzzy Hash: C5C15036B002059FDB04DFA9D8459AEB7F7FF88244B158529E806D7365EB34EC46CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 011369ccdb87c4cfd618606089f4e1634de318f492efe0f5542370f8584a7177
                            • Instruction ID: 7d0d9174625a8c76f77d28e062ee983f6c863287b96f47515b3a7a8e85160dab
                            • Opcode Fuzzy Hash: 011369ccdb87c4cfd618606089f4e1634de318f492efe0f5542370f8584a7177
                            • Instruction Fuzzy Hash: ECC14F31910719CFDB11EF78C854A99B7B1FF49314F158699E8896B261EB30EAC5CF80
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f0b2a45be0f15755b37ff17f18d42cc5ce3167bbc0d70e1048658b1923a65f07
                            • Instruction ID: e51f66367ad84d3be0154049adda30dd49a1d0decae1af37148954488e604eff
                            • Opcode Fuzzy Hash: f0b2a45be0f15755b37ff17f18d42cc5ce3167bbc0d70e1048658b1923a65f07
                            • Instruction Fuzzy Hash: F8A1E379A00249DFCB14DF68D888E99BBF6FF89320F164595E5059B362DB30EC85CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7ac28691f0dbf11c01d37dc2ebff59fb36c95751582698e9ecfa75ef4742c7a5
                            • Instruction ID: 633d097e0765f72cbc2a725045ea844070dc0d2a8713a1219783bd09f1b72cb5
                            • Opcode Fuzzy Hash: 7ac28691f0dbf11c01d37dc2ebff59fb36c95751582698e9ecfa75ef4742c7a5
                            • Instruction Fuzzy Hash: 5581B131A002059FC715DB68C988A6EBBFAFF88310F158169E51597366DB34ED46CBE0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 049fccf28c40930f8c50821d5148e8a5a4060a563fca8256656dc8a370bef56c
                            • Instruction ID: c12df8278c4f9d647487efdcc970ba4664213589548c5d5f31516bc60ffac3c3
                            • Opcode Fuzzy Hash: 049fccf28c40930f8c50821d5148e8a5a4060a563fca8256656dc8a370bef56c
                            • Instruction Fuzzy Hash: 7D81B131B002499FCB04EFB8C844AAE7BE6FFC9350B10856AE919DB355DF34E9158B90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e1fe4e195e9650af66c551f8b6ceb376b525c1e783d381743bffcadad6c67a0b
                            • Instruction ID: 4910e7d944351f3b65d2bd570c7bd0c04b79f7d874c7168502787448f9b26a1e
                            • Opcode Fuzzy Hash: e1fe4e195e9650af66c551f8b6ceb376b525c1e783d381743bffcadad6c67a0b
                            • Instruction Fuzzy Hash: 8D71E0367043059FCB10DF68D844E6ABBB6FF84310F05856AE55A8B7A1DB30EC45CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7758a9048327419b65725b15b27730e311e8b6a50d22a2d418d6fc3ef011dc69
                            • Instruction ID: 2397977ac9e22c9c6d14b93f9762f0bfb5b3bc2cf0063f2f75be9facb82b5b25
                            • Opcode Fuzzy Hash: 7758a9048327419b65725b15b27730e311e8b6a50d22a2d418d6fc3ef011dc69
                            • Instruction Fuzzy Hash: E181CE32B046048FCB14DF78D8846AEBBF6FF88310F15856AD44AD7651EB30E84ACB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b585f8e8bb12f29ecca58c4c7ffe6522941d7cb097c926bd7c6d30edaea29eb2
                            • Instruction ID: a5ca43f8f2b2126602f4fa27ea3a666e10460635db168c7d375c2cdec67657f5
                            • Opcode Fuzzy Hash: b585f8e8bb12f29ecca58c4c7ffe6522941d7cb097c926bd7c6d30edaea29eb2
                            • Instruction Fuzzy Hash: A7618C31B002158FDB15EF78C894A6EBBF6FF85310B048969E9059B3A5DB34ED45CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e97c34dcbe59285aeb24dab17a8064e38ff43b1af86c544a69b10db1b38cc5d9
                            • Instruction ID: ad780ef4107735dad0190033ab1be46269f7b79f09782b8b6ec8c73ffa42615d
                            • Opcode Fuzzy Hash: e97c34dcbe59285aeb24dab17a8064e38ff43b1af86c544a69b10db1b38cc5d9
                            • Instruction Fuzzy Hash: D6519D357006149FCB04DF69D998A2ABBFAFF8860171480A9E506DB775DF31EC15CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7a98f9ca5d8140563ad6f97f5506cd40e997295e7f67198dc58821c63e26844c
                            • Instruction ID: 4df1dfb0abd1a2d37a0e425361f5a2b02aa00b2f36537a498ab71adcf29181a2
                            • Opcode Fuzzy Hash: 7a98f9ca5d8140563ad6f97f5506cd40e997295e7f67198dc58821c63e26844c
                            • Instruction Fuzzy Hash: 1C510276A01209EFCB04CF59D884A9DBBF6FF89321F168565F5059B362DB30E885CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 92e5749513b27681cc8802470008673ece58bf78fcca1f183afbc718f4e7b242
                            • Instruction ID: 561a61a1641b58a3007d78b1dc95cba69068cb3fdf849b2176c06e411affcd9c
                            • Opcode Fuzzy Hash: 92e5749513b27681cc8802470008673ece58bf78fcca1f183afbc718f4e7b242
                            • Instruction Fuzzy Hash: 3251E375B012199FCB04DF68D59899EBBF2BF88310B258659E815EB365CB70EC42CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 98ed83a930f1e7beccaa9466ea720f90a96d73a5a442b8fc4520368c6333b727
                            • Instruction ID: 5c54c9ad69632a7525e05183c2078f9c38765b88989b304b538d50b25244a0d4
                            • Opcode Fuzzy Hash: 98ed83a930f1e7beccaa9466ea720f90a96d73a5a442b8fc4520368c6333b727
                            • Instruction Fuzzy Hash: 6B515F317002159FCB14EF68C984AAEB7B6FF84310F048969E5159B3A5DB34E945CBE0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b789b394fdcfd7c105dc367b1479d5ce8d43247d1ff7a11e57de582058d24155
                            • Instruction ID: f4988c6143d2ca952ce2383518eb6718ca4312dff351c54748f55f028c213b32
                            • Opcode Fuzzy Hash: b789b394fdcfd7c105dc367b1479d5ce8d43247d1ff7a11e57de582058d24155
                            • Instruction Fuzzy Hash: 2C412131A003058FCB15DF78D8456AEBBB6FF88314F144569E506AB355EF35E846CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a6d2a2651ebf13ceae1eaefbb5fca0f02c8c46bed7065d6593aca78ffbebdbb0
                            • Instruction ID: 2db968e6d92ccce5121e43c2f9e479e0186bd96592a510a675195d3cc1fe1c3a
                            • Opcode Fuzzy Hash: a6d2a2651ebf13ceae1eaefbb5fca0f02c8c46bed7065d6593aca78ffbebdbb0
                            • Instruction Fuzzy Hash: A6411E35A003058FCB15DF78D4456AEBBB6FF88314F148569E506AB354EF39E846CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 25619964ddad385948a2ae3f2741dfbf537517642e055c8d7c5ebc93f54641c3
                            • Instruction ID: 3eb11588913db48d6e8729e34dfbf76848397587696f1997a72e74a9b71f94a5
                            • Opcode Fuzzy Hash: 25619964ddad385948a2ae3f2741dfbf537517642e055c8d7c5ebc93f54641c3
                            • Instruction Fuzzy Hash: 1741B935E103099FC754AB74E448BEDB7B9FF89300F10862AE546A7351EF74A984CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed172c8483aa2de70624a1ea1b74fcce299d538301e580aacd8971f6c3d3f8a2
                            • Instruction ID: d94cb44c2896cf99219a92266d7b89d2969e4673625fe9c797b829748e940703
                            • Opcode Fuzzy Hash: ed172c8483aa2de70624a1ea1b74fcce299d538301e580aacd8971f6c3d3f8a2
                            • Instruction Fuzzy Hash: EC418631A14608CFCB05EF64D999A9DBFB1FF4A301F454499E401AB3A1DF34A94ACF91
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c206bc5344cd67955ffc6a2ada859c2ff4c9648fa65bf373a4c2f76bc6d8a53e
                            • Instruction ID: 3359bee4d35fac1c3e146ed9648d3cbc42905ea2bb67960a7600f97ed4d6d0b6
                            • Opcode Fuzzy Hash: c206bc5344cd67955ffc6a2ada859c2ff4c9648fa65bf373a4c2f76bc6d8a53e
                            • Instruction Fuzzy Hash: 5E41FA75A00204DFCB04DFA4D594AADBBF6FF4D305F148469E906A7391DB36AD42CB60
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b4fb9a8c47b7a5b7e9629ec3d7b53af965bf3880976c4503967f26046f662730
                            • Instruction ID: 8b23548a3ec3194c2f4072e1010bef5e95aed8e1a3c39f3fdac9894e8dad2388
                            • Opcode Fuzzy Hash: b4fb9a8c47b7a5b7e9629ec3d7b53af965bf3880976c4503967f26046f662730
                            • Instruction Fuzzy Hash: 96218071B006098FCB11EB69D9849AE77B6FF89200F404269D5069B365EF30ED49CBA1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6866cabe01d883285948c3458370ae611635543d0cf24c52b67306c1c51f5b80
                            • Instruction ID: 9252f0ff7dcacf569755b70ae9d12a3a84e0b8911d7793faac7be0d387664276
                            • Opcode Fuzzy Hash: 6866cabe01d883285948c3458370ae611635543d0cf24c52b67306c1c51f5b80
                            • Instruction Fuzzy Hash: 0F219C726046089FC711EB68C880E9BBBF9FF45314F01456EE142CB651EB30F946CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a132dba2210630663b558cea1cacd80c9c10e88d0547a235f2779f6c4d602f85
                            • Instruction ID: 61748cd281fc2953fd1fe87491d5f54a7631c776a83007c0fe37defe27b2dca4
                            • Opcode Fuzzy Hash: a132dba2210630663b558cea1cacd80c9c10e88d0547a235f2779f6c4d602f85
                            • Instruction Fuzzy Hash: 3F21B731B007498FCB11EB68D9549AE7BB6FF89200F40416AD5069B365EF34DD49CBD1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1780615032.00000000007FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7fd000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a6a9b7cf306012582770e9d59a7e2812b6e7f67c534eaabbc9aff627f77e885
                            • Instruction ID: 4729f8b090149d4547052ab5206bd5b69fc1936d6423ed369857266a93a23652
                            • Opcode Fuzzy Hash: 3a6a9b7cf306012582770e9d59a7e2812b6e7f67c534eaabbc9aff627f77e885
                            • Instruction Fuzzy Hash: D5212871504248DFCB25DF14D9C0B36BF66FB94318F20C569EA050B356C33ADC66D6A1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1780726713.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_80d000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 66304083c56d650c4f220383bc0ca4ff3706e2fe9555e141a00ac8b8229b96a7
                            • Instruction ID: f48541c1794cb8ffd5dcce0506f9d7b8ec77b3171e674f956f98a6936f02c3dd
                            • Opcode Fuzzy Hash: 66304083c56d650c4f220383bc0ca4ff3706e2fe9555e141a00ac8b8229b96a7
                            • Instruction Fuzzy Hash: 7721F271604704DFDB54DF54D984B26BBA5FB84318F20C569D84E8B296C33AD847CA61
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b58157d7ce22a2495034292055c48f48d61cf7a230e6af96e468357a674d8673
                            • Instruction ID: 9408a2d9aa9078bff7630cb06725bd20b4d8c37de4092b0b2f22c161da190859
                            • Opcode Fuzzy Hash: b58157d7ce22a2495034292055c48f48d61cf7a230e6af96e468357a674d8673
                            • Instruction Fuzzy Hash: 81212579B005058FCB04DF69D998C5ABBFAFF89614B2540A9E905DB331CB30EC05CB60
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 53b9f18806cbf3d141150b30586fa965247c979a78421ba423e9e84d2aad18ab
                            • Instruction ID: d640fe104ffb63df2d1634e59832b346487aa7adbb59ce190afae7af1b104916
                            • Opcode Fuzzy Hash: 53b9f18806cbf3d141150b30586fa965247c979a78421ba423e9e84d2aad18ab
                            • Instruction Fuzzy Hash: DE214A7A7045149FC744DB29E888D6EBBEAFF89711715816AF409CB361DB31EC058BA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 824609a963b955ea0089d23741bcd66450125b6aafd814a3d94f743836fd32d9
                            • Instruction ID: 6fe04405f7e299d25e04469b2fd35c9f4171a415dd3166527aca275cd3f7f0a5
                            • Opcode Fuzzy Hash: 824609a963b955ea0089d23741bcd66450125b6aafd814a3d94f743836fd32d9
                            • Instruction Fuzzy Hash: 2921B379B005158FCB04DF69D99886AB7FAFF89615B2140A9E906DB331CB70ED05CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c0f196d520751002fb641552396dc31ed8c882b9a4f212990fa9c6dce56c569c
                            • Instruction ID: edc6b1de0b0d7d18c2570bcaf3d459851d07a92799e98e9df7be8dd806327216
                            • Opcode Fuzzy Hash: c0f196d520751002fb641552396dc31ed8c882b9a4f212990fa9c6dce56c569c
                            • Instruction Fuzzy Hash: 4921A172A0425A9FCB01DFA8C880AAEFBF9FF44314F158166D550D7252D730E945CBE0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0bf178d1557b5da0f014ce07a95ce30112038cd04e568909239e7aa56d4c5aff
                            • Instruction ID: 8171f2f5f2b583a0d51f34dd8892ecdb7b8f7a753a330dac55678e5b3b2b0f67
                            • Opcode Fuzzy Hash: 0bf178d1557b5da0f014ce07a95ce30112038cd04e568909239e7aa56d4c5aff
                            • Instruction Fuzzy Hash: EE11AF326407149FC321CF2AC944A5BBBE6EFC9314B04897AE489CB761DA71FC468BD0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 75aefa19f12322ecd5edceb2b090d7399b06fcb07f95cdc5810a755c900fabb4
                            • Instruction ID: d3588bf491c6c1766244303c72b3288cba7ee8c23abf318566e841aa52749a30
                            • Opcode Fuzzy Hash: 75aefa19f12322ecd5edceb2b090d7399b06fcb07f95cdc5810a755c900fabb4
                            • Instruction Fuzzy Hash: 67118CB23093488FD30697B8A80127D7F95CFC5254F1981F7E658CBB92D925D907C791
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e94fdeff941119f861eddab311711583f2d630ff1cc99947a54fd2599337a9be
                            • Instruction ID: 182844a28c87c14a254ba087beec114fc4e461edf38e6556f351c9e2a0b29d73
                            • Opcode Fuzzy Hash: e94fdeff941119f861eddab311711583f2d630ff1cc99947a54fd2599337a9be
                            • Instruction Fuzzy Hash: 8D211531A002088FDB18DFA9D548ADDBBF6FF8C311F15806AD405B7250EB719984CFA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1780615032.00000000007FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7fd000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                            • Instruction ID: ac381f4bb18569f08c8331cf7c02f00690a7231e067a17df1bc55b5f44ff78ff
                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                            • Instruction Fuzzy Hash: 1C11D376504284CFCB16CF14D5C4B26BF72FB94318F24C6A9D9490B756C33AD86ACBA2
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d1e69317780dd384d923f781bac97917931e88085874d847f16a811a8f1ae088
                            • Instruction ID: ad0e26635ca836e09bb2052c95fc8670f35361661703fefabb23a52a0dbff72e
                            • Opcode Fuzzy Hash: d1e69317780dd384d923f781bac97917931e88085874d847f16a811a8f1ae088
                            • Instruction Fuzzy Hash: D8114871E002199BDB04DFA8E954ADDBBF6FF89310F14412AE804B73A0CB35AC41CBA4
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70ca349ae807d7548ab65430f641d73a2df4fa42b3a7c8d28f56d5b95e080a2c
                            • Instruction ID: 4f5bdd6ce42ccb8053a51cdafa73fc2397b0e114430bd5317df704abedddec6e
                            • Opcode Fuzzy Hash: 70ca349ae807d7548ab65430f641d73a2df4fa42b3a7c8d28f56d5b95e080a2c
                            • Instruction Fuzzy Hash: 6A112871E111199BCB04DFA8E954ADDBBF6FF89310F14502AE404B7760CB35A841CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7b2d627668178d327d958054105e58d0c72d66d27a736889376fa1e9de3dc05d
                            • Instruction ID: bc4933908a6c7e130b7a30be140df301617bba7da51c55b2099a7f305a9d68c1
                            • Opcode Fuzzy Hash: 7b2d627668178d327d958054105e58d0c72d66d27a736889376fa1e9de3dc05d
                            • Instruction Fuzzy Hash: 1801D432B083545FD7069A39581576E7BFBDBC5250F0980A7D544D7382DE28C90287A1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1780726713.000000000080D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0080D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_80d000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                            • Instruction ID: 3be3a9b1e166b9522f44902ad43285d2c7e2c59cbd312116f8e84a6f806dd698
                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                            • Instruction Fuzzy Hash: B011BB75504780CFCB11CF54D9C4B16BBA2FB84314F24C6AAD8098B696C33AD80ACBA2
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e0849bd7820192fa0323c945b3f377eb1ed98ee352a39d2bb7775687bb33ea38
                            • Instruction ID: f9e5b75e25ef1e50f4611f83e0f66827c8c71f63bb3aea0f172ddfbe43b25ac4
                            • Opcode Fuzzy Hash: e0849bd7820192fa0323c945b3f377eb1ed98ee352a39d2bb7775687bb33ea38
                            • Instruction Fuzzy Hash: 6D1130763001119FCB15CE19C884B6AB7AEFF88711F198055F919CB269C734DC41CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a0aee941899b10144f14c2deb919fbdc195506b77b5647a93d2563f96f6f8472
                            • Instruction ID: 867aa3edf175bf680bded45f428756a6b846253af591f629dfe8cf11b6d9f35d
                            • Opcode Fuzzy Hash: a0aee941899b10144f14c2deb919fbdc195506b77b5647a93d2563f96f6f8472
                            • Instruction Fuzzy Hash: 1C11A176A10608CFCB40DFB8D845DAEBBF4FF49311B01466AE905E7360E771A945CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e84526680b5e69abb63f38fc2a7bf484122c5ee15f23e507a03bcfed020df2a1
                            • Instruction ID: 4ab7f27d807c3d8cdba4da9762f0f72de4336b1ca5476f215906a5189226d36e
                            • Opcode Fuzzy Hash: e84526680b5e69abb63f38fc2a7bf484122c5ee15f23e507a03bcfed020df2a1
                            • Instruction Fuzzy Hash: 94112371E012189BCB04DFA8E944ADDBBF6FF89310F10902AE804B7360CB356C40CBA4
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 902af4c862b47bff8e8f44f842e7636629d94a007e26b8f16490554f62b8b61f
                            • Instruction ID: 47e6528622279d7ed45b8943cafdea1f8a3e7350c641a6c3b617159d0a74ddd6
                            • Opcode Fuzzy Hash: 902af4c862b47bff8e8f44f842e7636629d94a007e26b8f16490554f62b8b61f
                            • Instruction Fuzzy Hash: F411B675904208EFCF41CFA4C944AA9BBF5FF48210F1484A9E949D7251D732DA61EFA1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d31fb4aee3f8c9f38a5c91a45581cf01d2d5ddbc8260af3ac2c2b89974300eea
                            • Instruction ID: 32d9715cd0794fa2087b372ae9e22c9b2bf7251e00451859d26f48a08b62f285
                            • Opcode Fuzzy Hash: d31fb4aee3f8c9f38a5c91a45581cf01d2d5ddbc8260af3ac2c2b89974300eea
                            • Instruction Fuzzy Hash: 40014075A106099FCB44DFA8D888CAEBBF9FF89211B10456AE905D7320DB71A944CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a0b45a99f9989b407e08a24124a8af7445c77080c29a512e4d5043d2347f94fc
                            • Instruction ID: a0f026b8e4282ab63c79a0bb8cabb958e6db6344b684b64edc546b0ec5a7d0cd
                            • Opcode Fuzzy Hash: a0b45a99f9989b407e08a24124a8af7445c77080c29a512e4d5043d2347f94fc
                            • Instruction Fuzzy Hash: 0D01DB32A043559BCF15DBA9C8146EEBFFAAF88300F084469D451F7251CB359904DBB0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1780615032.00000000007FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7fd000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cebe687501c8cc3cfbe21edbd173ff692d372a8db6d42e6c109840c47e5a0b7c
                            • Instruction ID: c92fff23657d0f37e3b4c2bc70c3ccf5f4af387386ae3307e66a5bd32c203879
                            • Opcode Fuzzy Hash: cebe687501c8cc3cfbe21edbd173ff692d372a8db6d42e6c109840c47e5a0b7c
                            • Instruction Fuzzy Hash: C7012B310083489AE7309B19CE84777BF99EF45364F18C46AEE0C8A386C67DDC40CA71
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f882fa78b89d2a53794ef298dc5fa105a961c6b3b7edcceed958d20190afc895
                            • Instruction ID: f7e23fe56954fe176be11a9171c38cca6fca0b2317ea3341dd087869be1a09e9
                            • Opcode Fuzzy Hash: f882fa78b89d2a53794ef298dc5fa105a961c6b3b7edcceed958d20190afc895
                            • Instruction Fuzzy Hash: AB0188353605109FC704DF69D444D65B7E9FF89B5231640AAF606CB371DA72EC51CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 47a973cb38afd3236fa66654eabee5d118f7f303fc6b65c42a35e9cd1a6e934f
                            • Instruction ID: c36d49bbdd5f0a24a63515759d9a8d056ba5a41f5fe8dc4a7e679a1982ca12b3
                            • Opcode Fuzzy Hash: 47a973cb38afd3236fa66654eabee5d118f7f303fc6b65c42a35e9cd1a6e934f
                            • Instruction Fuzzy Hash: F0014F72A0001AAFCB01DF98CD05EDE7BBAEF49314F154165E614EB2B1D7319A15CBD1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 485d77266b533faa0a7e0717d92608860f664b56df9a0d0725adde8f52ff6de3
                            • Instruction ID: a7d36b6633077ec1220380bc9fc38a9be8ea62622742ef1ee2c9c8978e07b505
                            • Opcode Fuzzy Hash: 485d77266b533faa0a7e0717d92608860f664b56df9a0d0725adde8f52ff6de3
                            • Instruction Fuzzy Hash: F001AD71B042149FDB15DBA8D889BAEBFFAFB89210F050529E246D33A1CB319845CBD0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 653fbc8841bc3dbb08fb2164c2739c2b7d8f898b703722c4016af9835253b57d
                            • Instruction ID: f0fc36d5093d80195e81f4a6ee6ec2d0e90d13e029744575de5b9422ced372d9
                            • Opcode Fuzzy Hash: 653fbc8841bc3dbb08fb2164c2739c2b7d8f898b703722c4016af9835253b57d
                            • Instruction Fuzzy Hash: ED01B532A043599BCF25CBA5C8146AEBFFABF88300F04446DE552B3250CB359904DBB0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c2da4630b2d68b455a0eed8d30a8f0eb2fed1156bad7f169b0eceb0c067f83b9
                            • Instruction ID: 015d1c6e472d58f4dde5dc3c34e34f7a739fe9db809a0b4cf85a1c992f9be21b
                            • Opcode Fuzzy Hash: c2da4630b2d68b455a0eed8d30a8f0eb2fed1156bad7f169b0eceb0c067f83b9
                            • Instruction Fuzzy Hash: BBF04F323142118BCB159A69D444B69B7EAFFC9265B0A4469E44AC7791CB31CC42CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c5a81f6d77666316917c566eb7a8951ef4a3d05f38ca4e0b2526e4a9539ee18
                            • Instruction ID: 867d50a759dc59f4c899be749a416c7867a2d4ff2d1d2a998590b610dcbe8900
                            • Opcode Fuzzy Hash: 3c5a81f6d77666316917c566eb7a8951ef4a3d05f38ca4e0b2526e4a9539ee18
                            • Instruction Fuzzy Hash: CFF0E9337002146BDB059E99EC55EEFB7AADFC8260F044426E912E7351DF219C5586E0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1a2a8b3ec3e1254a56dd0e368fb96744e279eb5f159125ff3bd84d0f9f24cab7
                            • Instruction ID: c517d20a9d305b40a7368dd6b70d9dad452821ff9ac326b11a343798cdc35047
                            • Opcode Fuzzy Hash: 1a2a8b3ec3e1254a56dd0e368fb96744e279eb5f159125ff3bd84d0f9f24cab7
                            • Instruction Fuzzy Hash: 2A01F676600625AFD705CE49D988DAAF7EDFB88321705C666F919DB701CB34E842CB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6f8ccbed4650e65571fee7db1c20747aae1dd0b2e1dfa5e47286944c570f212b
                            • Instruction ID: e0bad8f75fc999b8c674f2963915cc8ccbebf7a0f3de90d2ae1f969214f6b6cc
                            • Opcode Fuzzy Hash: 6f8ccbed4650e65571fee7db1c20747aae1dd0b2e1dfa5e47286944c570f212b
                            • Instruction Fuzzy Hash: 6501D470909309CBE742EF68E80977E7BF5EB41308F088499D552A7691CB784605EBE1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 114f0300dafa49e9f99f353c324a04b0f58148e3612c66e3f9604d4d6aca03d8
                            • Instruction ID: 1c3130b999b758f42224d2ac59f942018b1a35164bbcfd9d370e6f4f7a5b9a2f
                            • Opcode Fuzzy Hash: 114f0300dafa49e9f99f353c324a04b0f58148e3612c66e3f9604d4d6aca03d8
                            • Instruction Fuzzy Hash: 07F019367406058FCB05EBA8E559AAC77B2FB88321B250469E406DB3A0DF35ED45CBA1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 72666a68d36412b91895de1b1dda8166a6d27a363b2b95e22da7bba945513deb
                            • Instruction ID: a9ff1053a3c75616f90d5b853f2ccda3c0e0e42a145b21059c37fccd4c61a581
                            • Opcode Fuzzy Hash: 72666a68d36412b91895de1b1dda8166a6d27a363b2b95e22da7bba945513deb
                            • Instruction Fuzzy Hash: D3F08C75B002149FCB159FA9D888A6EBFF9FB88210F040129E50693361CB709845CBD0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1780615032.00000000007FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007FD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_7fd000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 707a41ec0306e8387be6d537dba0d4afba69ee5f9f62ff37f4275a0f3574bf8e
                            • Instruction ID: b35eeeab1a7818213b2ad3e949674f3035423630431dd690144819780dc5d429
                            • Opcode Fuzzy Hash: 707a41ec0306e8387be6d537dba0d4afba69ee5f9f62ff37f4275a0f3574bf8e
                            • Instruction Fuzzy Hash: 9AF062714083449AE7208E1ADD84B66FFA8EB55764F18C45AEE0C8A396C2799C45CAB1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7ad34fab37a9e501bdcc71b10c563b6577e5282bb72c719ca805c93a3979e14
                            • Instruction ID: b241f44ad108a2f5a9bdcc6300f34e89d3348b8aac55a9413de48ad77774a977
                            • Opcode Fuzzy Hash: d7ad34fab37a9e501bdcc71b10c563b6577e5282bb72c719ca805c93a3979e14
                            • Instruction Fuzzy Hash: 38F0193690010AAFCB00DF98D904DDEBBB6EF49310B1181A5E618AB270D732AA15CB91
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 342069fef979e55c8fc56fb6422096fbaad388d67544c6d75d831da17e7faf45
                            • Instruction ID: 32617a0b910fd54ac947408707cbc19936b404fcdf2b83cad19812efd25a59ad
                            • Opcode Fuzzy Hash: 342069fef979e55c8fc56fb6422096fbaad388d67544c6d75d831da17e7faf45
                            • Instruction Fuzzy Hash: 96F06D313102058FCB199A69D448A2677EBEFC92257164469E00AC7360CF31CC42CBA0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 22c94ad86d58674ac36270741c61a55e5b634464a3b8ec8eaa16e04d209d9e8d
                            • Instruction ID: 876cd96680f9eceecfc30ddc85580fbeed3a1a1537f80bf1b379c7408213a5da
                            • Opcode Fuzzy Hash: 22c94ad86d58674ac36270741c61a55e5b634464a3b8ec8eaa16e04d209d9e8d
                            • Instruction Fuzzy Hash: 4DF0B43316D7954BE7224364EC113793F9ADF86214F0D40A39488CFAD2C659C80697E1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: badcfd2462a14838762fc46066bb3066dcea26b4d6701cd57affc9ca0920c0bb
                            • Instruction ID: bfcae624212c85e5cedf8bf18b664876e20e5bb7fe795e103f24ec72d37cc9d5
                            • Opcode Fuzzy Hash: badcfd2462a14838762fc46066bb3066dcea26b4d6701cd57affc9ca0920c0bb
                            • Instruction Fuzzy Hash: EEF09036B04109DFEB149F58F8448AAF33AFBC0325750C576E61987210CB32A866CBE1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e1df8014448991cfbc3768b29cf20135a47d8cf658ae98822a13ed10e2b5ea2b
                            • Instruction ID: 0fb3b2a1bf265546a5a397fe4bfb78099ef0b231c046ce8d4b1b491b9f1c7b0e
                            • Opcode Fuzzy Hash: e1df8014448991cfbc3768b29cf20135a47d8cf658ae98822a13ed10e2b5ea2b
                            • Instruction Fuzzy Hash: BBF0A072F00229AFCB44EF7CD8416DDBBF5EF48210B508066E809E7241E7309A00CBD0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b700aeef57eaac57e959f375a27371889009df2c6d8e6119cc4dd5e39b64a712
                            • Instruction ID: b01b8ccb5f138bf3f4222bfc6677835d3ca24db83cf49ad03d9d9b44f35ea8fc
                            • Opcode Fuzzy Hash: b700aeef57eaac57e959f375a27371889009df2c6d8e6119cc4dd5e39b64a712
                            • Instruction Fuzzy Hash: A2E092353883545FD31596ACC418B5AB7DDBF49344F454468E14ACB6E1DB60D841C7E0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1144a22a50a87ee687e7c051b884ee210d2cab500fb7059661ff91e24e5ae6ee
                            • Instruction ID: 13235cbd4dd5799cca0b9f7ac4aefb2bb98f2b84eef3f459a6aa708d9f88d41e
                            • Opcode Fuzzy Hash: 1144a22a50a87ee687e7c051b884ee210d2cab500fb7059661ff91e24e5ae6ee
                            • Instruction Fuzzy Hash: ACF05872D0021A8FCB40EFBCDA412DEBFB0AF05200F54456AD958E7215E7348A64CBC1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bc714a246ea67fddd3cfb41ccfe271c81f78c0d061e0880c560d8e790884d4ba
                            • Instruction ID: 1159331c9c5474eff8034687be71050ab098cf5984d52cd5696c18e4fc212beb
                            • Opcode Fuzzy Hash: bc714a246ea67fddd3cfb41ccfe271c81f78c0d061e0880c560d8e790884d4ba
                            • Instruction Fuzzy Hash: F7E04F327442445BD314A6A99404B66B7DDBB45364F44446AE21ACB6A4DB61E840C7A4
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90223024e3474aac9b5e38d7c416a5ec7aec185724f8ad6fb4a6c026479de323
                            • Instruction ID: 32fe37eb137adb6b74c8f1cbf87d29b119953e64d738d5a1b2086ba4d7467470
                            • Opcode Fuzzy Hash: 90223024e3474aac9b5e38d7c416a5ec7aec185724f8ad6fb4a6c026479de323
                            • Instruction Fuzzy Hash: 28E0863326462603DB255398F4157B577CEDBC4624F184177E40DCFB81CA95985197E1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3f40d3b8547dc780c657bcb56546cf2267ea85c185c7e4c6f13ff4267cf1705
                            • Instruction ID: 6974fada4d23df8e8cbb38b9a0d1f31ebe1ddb0c53b56c2fee699159a142edac
                            • Opcode Fuzzy Hash: c3f40d3b8547dc780c657bcb56546cf2267ea85c185c7e4c6f13ff4267cf1705
                            • Instruction Fuzzy Hash: A7F01571D006198FCB40EFB8D9012DEBBF4AF05300F108126D949E7210E7309A548BD1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b4be2dfe8413ae7f08a1a4e04cb940eed2523e059359f04a593969ebb8c9b6e5
                            • Instruction ID: 737f4313e84b6b4dbd7a77fa570cfe4e8e989954ae60e6a8223f2319e4ab0bd0
                            • Opcode Fuzzy Hash: b4be2dfe8413ae7f08a1a4e04cb940eed2523e059359f04a593969ebb8c9b6e5
                            • Instruction Fuzzy Hash: 5DE0ED71E00218AFCB44EFA8D4055EEBBF5EF48210B108166D519D3200E7305A10CBE0
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c6d20315596fc72e6eef0694296ef625631382f87c8ca90f92803d6cee49ef1b
                            • Instruction ID: cea2b68ef85fd31540dbbf1f902ded9b64fd0584d78f59139251e42a5f06e42e
                            • Opcode Fuzzy Hash: c6d20315596fc72e6eef0694296ef625631382f87c8ca90f92803d6cee49ef1b
                            • Instruction Fuzzy Hash: CAE09232A04609CFCB00EF60D41969DBBB1AF49344F214919D802B7250EB7455C4CBD1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 738e9b32cdc9d55597842d4dc5f895ac2ebc91f1e494bdc95fd965aca694f7ce
                            • Instruction ID: 393f5b1287350e9762ab8637518e730308cdc43766b2afa3e6e6d971bc79dff6
                            • Opcode Fuzzy Hash: 738e9b32cdc9d55597842d4dc5f895ac2ebc91f1e494bdc95fd965aca694f7ce
                            • Instruction Fuzzy Hash: D4E0CD323104914BDB15A714D41A77D3F13DB80795F58857AF806CB781DF39490787D4
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 45d2ab68a2c595135b984ff75fd6dbf150ef5f07398829dc1f2acb4711d3e626
                            • Instruction ID: fc71cd76deb8b1198d0cf7fb58800287eed70a74222351088472d9050d260fb1
                            • Opcode Fuzzy Hash: 45d2ab68a2c595135b984ff75fd6dbf150ef5f07398829dc1f2acb4711d3e626
                            • Instruction Fuzzy Hash: 80E08636700460CFC7049B2CD50465E7BE69BCC226B19009BD049C7362CB35DC478B80
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3b77f7e19f4a7191b6f7dfdc3ab310a50c8a1e48996f2eb2727303edc9e12f5e
                            • Instruction ID: 49c7db3eb4b0afecc0e231850773a136a863fc0d9dd6b621a5dff4f75b82c734
                            • Opcode Fuzzy Hash: 3b77f7e19f4a7191b6f7dfdc3ab310a50c8a1e48996f2eb2727303edc9e12f5e
                            • Instruction Fuzzy Hash: F3D017327101209F86049A5EE90486ABBEEDFC962132540AAE109C7362CA61EC028B90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: baaa41c0f8ea734f9a1ebf5cc6cdacac58ce2aa754cf841e10b435b2f6b3664f
                            • Instruction ID: 83a509449c180863ff179bf34eb03398eccdccae4ee7197384adfbcaf2774f2a
                            • Opcode Fuzzy Hash: baaa41c0f8ea734f9a1ebf5cc6cdacac58ce2aa754cf841e10b435b2f6b3664f
                            • Instruction Fuzzy Hash: BAD0C9713880289FF2467618FC257BF2996DB8922CF1A01556E82D77DACA98DD4302C1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d18d8cb6e201cc4f4899f400bae9b44f6f3bd7c7e950af2f3f42a0a9e0cabec8
                            • Instruction ID: 5e281efb3f54653fd07b60d24a5f9d35d07981a92b42ac55abb6c537dce9ecb2
                            • Opcode Fuzzy Hash: d18d8cb6e201cc4f4899f400bae9b44f6f3bd7c7e950af2f3f42a0a9e0cabec8
                            • Instruction Fuzzy Hash: E1D0A771424A465FCF01FB34FC98F453F61FB05741F0C0080D15281026E22052178B41
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 96b94bc2ee8a854ff670de7da4e136f12457cb2b22d1a690c184279d42d7194d
                            • Instruction ID: 56adabd1e6ec56d874bc1819c528fc5b2f28b69658939c6ddf3e47d3b684f684
                            • Opcode Fuzzy Hash: 96b94bc2ee8a854ff670de7da4e136f12457cb2b22d1a690c184279d42d7194d
                            • Instruction Fuzzy Hash: 3EC08C31190208CFCB04ABE8F048DB93BADFF9822931140A1F61C87631EB22EC00CE90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 506a8200645e612c39a6da061621a9c9dd6ae783ec1775d5f68d8769075b2e99
                            • Instruction ID: c8c4084fe2c50e42b4b98116c75f13d859737af6e2e427cf9ad6f648556f740e
                            • Opcode Fuzzy Hash: 506a8200645e612c39a6da061621a9c9dd6ae783ec1775d5f68d8769075b2e99
                            • Instruction Fuzzy Hash: 23D0927154120ACFD710DF90C269BAE7FB1FB44344F600818E002AA651CB764A85CFE1
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 46b1cc8d33d02a8757a56305e053f98b1a620c223f6857cec88c04597cdf393a
                            • Instruction ID: 9bc62db777d90056bfad6181e90121ded5c5164fd2cad4232ac6ebdae97ef4df
                            • Opcode Fuzzy Hash: 46b1cc8d33d02a8757a56305e053f98b1a620c223f6857cec88c04597cdf393a
                            • Instruction Fuzzy Hash: 0FC1C374E01218CFDB58DFA9D890B9DBBB2BF89300F1085A9D419AB355DB346E46CF40
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5cda16e3c6e9ef8c32c8d0f13e46e4b55cd0dd684ffdf39480b1bb9ea84dc130
                            • Instruction ID: ec7d1802789cdda9e9284da73bf99a1ff952bcdc6392b53e294b8c3b41a53a67
                            • Opcode Fuzzy Hash: 5cda16e3c6e9ef8c32c8d0f13e46e4b55cd0dd684ffdf39480b1bb9ea84dc130
                            • Instruction Fuzzy Hash: 07C1C374E01218CFDB58DFA9D890B9DBBB2BF89300F1085A9D419AB355DB346E46CF41
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9ba289052e2f9f1e3d5c1c5098eafd593acd27810e49c2eb1ac078e7c034491c
                            • Instruction ID: 154ba22a9795df15a93e780037204b01a9dfd212dcabb8512e2143192c9c8519
                            • Opcode Fuzzy Hash: 9ba289052e2f9f1e3d5c1c5098eafd593acd27810e49c2eb1ac078e7c034491c
                            • Instruction Fuzzy Hash: C4218275A00318CFDB04EF98D8C2AADFB75FB89300F604155E649AB352E6719D81DB80
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 34c37a0ab2a0b6745e8d3e278aea6161b29a552c517ffb8696f613f7634b78b6
                            • Instruction ID: ba7912e01d44e88df2e9a8b0cc87d83174f0e648cb6a228526de4fb55dc67a50
                            • Opcode Fuzzy Hash: 34c37a0ab2a0b6745e8d3e278aea6161b29a552c517ffb8696f613f7634b78b6
                            • Instruction Fuzzy Hash: 1901E434A452189FCB04CF88D845AECB7B5FB8A311F205559E919AB261D731ED11DB90
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3d29d560fc9476e35a055e5752588f6dd7fe491156127aff2bfc88f3332fa282
                            • Instruction ID: f8def8b431b5ef92dc242ea6ca5cb27123748c4bf2b2425950258db322e2be8a
                            • Opcode Fuzzy Hash: 3d29d560fc9476e35a055e5752588f6dd7fe491156127aff2bfc88f3332fa282
                            • Instruction Fuzzy Hash: C8E09230C4910FDAEF18CF95C015BBFF675FB45305F619845880973280DB704A448F66
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788156147.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d653bdca5637fea1c400f396ff27443a780b55af78251a420745146528d3adbb
                            • Instruction ID: 1245a10b920420f66d8aab7b9250d5d23fd35330bf83594d413b89f0d5b192e4
                            • Opcode Fuzzy Hash: d653bdca5637fea1c400f396ff27443a780b55af78251a420745146528d3adbb
                            • Instruction Fuzzy Hash: F1F0A570948219CAEF289F68DC987BEBB75BB06305F509455C00677290C7B40685DF94
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                            • API String ID: 0-4048127968
                            • Opcode ID: b47a39c56bb9c1aec68efd9e8b56f0951d1e4f238bc910f3bfdeb81f15ac41b7
                            • Instruction ID: 2efd11af226d537540e3af6e82872ad075fa73cdd50a84a7ecda873e943c2994
                            • Opcode Fuzzy Hash: b47a39c56bb9c1aec68efd9e8b56f0951d1e4f238bc910f3bfdeb81f15ac41b7
                            • Instruction Fuzzy Hash: 1B91A731300B00AFD6056FA5DC51E7EE653FB86700B504438E20A4F7A9DFB6AE1E4796
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1788200321.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_59a0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                            • API String ID: 0-4048127968
                            • Opcode ID: 3c55b078514a4ee2f819a2a9ddb8bc011c5d97434fc8428905da552bb1ea854f
                            • Instruction ID: f33ffc0a9a5091180271b31a01d3ad4f4a5ec06f8be114dbdca53e7ac34b817b
                            • Opcode Fuzzy Hash: 3c55b078514a4ee2f819a2a9ddb8bc011c5d97434fc8428905da552bb1ea854f
                            • Instruction Fuzzy Hash: DD91A631700B00AFD6056FA5DC45E7EE653FB86700B504438E20A4F7A9DFB6AE1E4792